Pelvic-Floor 发表于 2025-3-28 17:41:34

http://reply.papertrans.cn/87/8642/864129/864129_41.png

吞噬 发表于 2025-3-28 21:51:28

http://reply.papertrans.cn/87/8642/864129/864129_42.png

倾听 发表于 2025-3-29 00:42:30

http://reply.papertrans.cn/87/8642/864129/864129_43.png

calumniate 发表于 2025-3-29 04:39:15

Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques parameterized by the word size, from one to 64 bits. We mostly study the one-bit version of RadioGatúnsince according to the authors, attacks on this version also affect the reasonably-sized versions. On this toy version, we revisit the claims of the designers and first improve some results. Second

Irksome 发表于 2025-3-29 08:45:31

http://reply.papertrans.cn/87/8642/864129/864129_45.png

针叶树 发表于 2025-3-29 11:40:36

Collisions and Other Non-random Properties for Step-Reduced SHA-256 complexities 2. and 2., respectively. We give example colliding message pairs for 23-step and 24-step SHA-256. The best previous, recently obtained result was a collision attack for up to 22 steps. We extend our attacks to 23 and 24-step reduced SHA-512 with respective complexities of 2. and 2.. Ad

facilitate 发表于 2025-3-29 16:59:15

http://reply.papertrans.cn/87/8642/864129/864129_47.png

起波澜 发表于 2025-3-29 23:13:22

Faster Halvings in Genus 2mal performance case, where .(.) = ., we also improve on the state-of-the-art and when .(.) is irreducible of degree 2, we achieve significant savings over both the doubling as well as the previously fastest halving formulas.

lavish 发表于 2025-3-30 03:56:43

On Software Parallel Implementation of Cryptographic Pairings exploiting such parallelism (extending previous results in the context of ECC) and show that it is possible to accelerate pairing evaluation by a significant factor in comparison to a naive approach.

摘要 发表于 2025-3-30 04:56:22

On the Exact Success Rate of Side Channel Analysis in the Gaussian ModelGaussian leakage model. We introduce a new approach that allows us to efficiently compute the success rate of an attack in this model and we apply it to the two main families of side channel analysis: differential side channel analysis and profiling side channel analysis.
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Selected Areas in Cryptography; 15th Annual Internat Roberto Maria Avanzi,Liam Keliher,Francesco Sica Conference proceedings 2009 Springer-