Minutes 发表于 2025-3-26 22:34:56

Zero Common-Knowledge Authentication for Pervasive Networks security association without any pre-established secret or common security infrastructure. Under these circumstances it turns out that without unrealistic assumptions authentication of previously unknown parties is not achievable. However, for a wide spectrum of scenarios much weaker authentication

Myocyte 发表于 2025-3-27 01:20:12

http://reply.papertrans.cn/87/8642/864132/864132_32.png

细微的差异 发表于 2025-3-27 05:18:00

http://reply.papertrans.cn/87/8642/864132/864132_33.png

骑师 发表于 2025-3-27 09:39:48

http://reply.papertrans.cn/87/8642/864132/864132_34.png

一起平行 发表于 2025-3-27 16:18:09

Authenticated On-Line Encryptionxt attacks on on-the-fly cryptographic devices. We remark that most of the existing solutions are insecure in this context, since they provide a decryption oracle for any ciphertext. We then propose a generic construction called Decrypt-Then-Mask, and prove its security in the blockwise adversarial

加入 发表于 2025-3-27 21:05:39

Five Practical Attacks for “Optimistic Mixing for Exit-Polls”practical attacks for their mix-net, and break both its privacy and robustness..The first attack breaks the privacy of any given sender .. The second attack requires that the first mix-server is corrupted. Both attacks are adaptations of the “relation attack” introduced by Pfitzmann ..The th

inspired 发表于 2025-3-27 22:49:17

Security Analysis of SHA-256 and Sisterse basic building blocks of the structure. It is concluded that neither Chabaud and Joux’s attack, nor Dobbertin-style attacks apply. Differential and linear attacks also don’t apply on the underlying structure. However we show that slightly simplified versions of the hash functions are surprisingly

跳脱衣舞的人 发表于 2025-3-28 03:57:19

A Chosen IV Attack Against ,allow an attacker that chooses the initialization vector (IV) to recover some partial information about the secret key. In particular, when using Turing with a 256-bit secret key and a 128-bit IV, we present an attack that requires the ability to choose 2. IV and then recovers the key with complexit

博爱家 发表于 2025-3-28 07:30:01

http://reply.papertrans.cn/87/8642/864132/864132_39.png

树上结蜜糖 发表于 2025-3-28 13:03:36

On the Use of GF-Inversion as a Cryptographic Primitivetial and linear properties. Inputs and outputs are usually transformed by addition (e.g. XOR) to key bits. We call this construction the APA (Add-Permute-Add) scheme. In this paper we study its pseudorandomness in terms of .-wise independence..We show that the pairwise independence of the APA constr
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Selected Areas in Cryptography; 10th Annual Internat Mitsuru Matsui,Robert J. Zuccherato Conference proceedings 2004 Springer-Verlag Berlin