垫子 发表于 2025-3-25 04:17:00
Integer Decomposition for Fast Scalar Multiplication on Elliptic Curvesvarious speedup techniques for the scalar multiplication have been developed. Recently, Gallant .. published a method that accelerates the scalar multiplication and is applicable to a larger class of curves [.]. In the process of their method, they assumed the existence of a special pair of two shor充满人 发表于 2025-3-25 08:22:33
http://reply.papertrans.cn/87/8642/864131/864131_22.pngparallelism 发表于 2025-3-25 14:51:41
Encryption-Scheme Security in the Presence of Key-Dependent Messagese, one encrypts using a shared key . the value .. Here we introduce a new notion of security, KDM security, appropriate for key-dependent messages. The notion makes sense in both the publickey and shared-key settings. For the latter we show that KDM security is easily achievable within the random-or亲属 发表于 2025-3-25 17:41:30
On the Security of CTR + CBC-MACe CTR (“counter”) encryption mode with CBC-MAC message authentication and is based on a block cipher such as AES. We present concrete lower bounds for the security of CCM in terms of the security of the underlying block cipher. The conclusion is that CCM provides a level of privacy and authenticity婴儿 发表于 2025-3-25 23:31:46
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing encryption scheme using a cryptographic pseudorandom-number generator, this objective can be achieved by the simple combination of encryption and MAC generation. This naive approach, however, introduces the following drawbacks; the implementation is likely to require two scans of the data, and indedetach 发表于 2025-3-26 01:51:01
http://reply.papertrans.cn/87/8642/864131/864131_26.pngContort 发表于 2025-3-26 07:06:14
Higher Order Differential Attack of ,(II) key is attackable by Higher Order Differential Attack and even if FL function is included, 9 round variant is attackable by Square Attack. In this paper, we present a new attack of . using 16-th order Differential and show that 11 round variant without FL function is attackable. Moreover, we show t蹒跚 发表于 2025-3-26 10:34:55
Square-like Attacks on Reduced Rounds of IDEAgorithm and are based on the observation that suitable chosen plaintexts give rise to some special kind of distributions which provide a way to distinguish reduced round IDEA output from a random permutation with very few plaintexts. As a result, we develop an attack for 3.5 rounds of IDEA which reqDAUNT 发表于 2025-3-26 15:20:48
http://reply.papertrans.cn/87/8642/864131/864131_29.png一个搅动不安 发表于 2025-3-26 17:57:24
On Propagation Characteristics of Resilient Functionsst introduce a new upper bound on nonlinearity of a given resilient function depending on the propagation criterion. We later show that a large class of resilient functions admit a linear structure; more generally, we exhibit some divisibility properties concerning the Walsh-spectrum of the derivati