Detain 发表于 2025-3-27 00:22:43

http://reply.papertrans.cn/87/8642/864137/864137_31.png

反省 发表于 2025-3-27 04:20:54

Collision Attack and Pseudorandomness of Reduced-Round Camellia random permutation of the blocks space. By using collision-searching techniques, the distinguishers are used to attack 6,7,8 and 9 rounds of Camellia with 128-bit key and 8,9 and 10 rounds of Camellia with 192/256-bit key. The attack on 6-round of 128-bit key Camellia is more efficient than known a

Pigeon 发表于 2025-3-27 06:55:41

Password Based Key Exchange with Mutual Authenticationd later by Gennaro and Lindell . However, these protocols do not support mutual authentication (MA). The authors explained that this could be achieved by adding an additional flow. But then this protocol turns out to be 4-round. As it is known that a high entropy secret based key exchange protoc

象形文字 发表于 2025-3-27 12:02:09

Extending the Resynchronization Attackrd attack with cryptanalytic techniques such as algebraic attacks and linear cryptanalysis. Our results show that using linear resync mechanisms should be avoided, and provide lower bounds for the nonlinearity required from a secure resync mechanism.

Bronchial-Tubes 发表于 2025-3-27 17:39:09

Perfect Diffusion Primitives for Block Ciphers lead to interesting combinatorial problems: how to maximize the number of occurrences of 1 in those matrices, and how to minimize the number of pairwise different entries. We investigate these problems and construct efficient 4 × 4 and 8 × 8 MDS matrices to be used e.g. in block ciphers.

我还要背着他 发表于 2025-3-27 18:12:08

http://reply.papertrans.cn/87/8642/864137/864137_36.png

细微差别 发表于 2025-3-28 01:24:25

A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogueintroduce a left-to-right recoding with the same digit set as the .-NAF, generalizing previous results. We also prove that the two recodings have the same (optimal) weight. Finally, we sketch how to prove similar results for other recodings.

夸张 发表于 2025-3-28 03:08:51

Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexitys not need any irreducibility testing when there is a Gaussian normal basis of type (2,3) in .(..). We show that our algorithms are simple to implement and the time complexity of our methods are comparable to the best ones proposed so far.

ineptitude 发表于 2025-3-28 09:21:47

http://reply.papertrans.cn/87/8642/864137/864137_39.png

hemoglobin 发表于 2025-3-28 12:26:04

Password Based Key Exchange with Mutual Authentication an efficient construction in the common reference string (CRS) model. Our protocol is even simpler than that of Katz, . Furthermore, we show that our protocol is secure under the DDH assumption (. random oracle).
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Selected Areas in Cryptography; 11th International W Helena Handschuh,M. Anwar Hasan Conference proceedings 2005 Springer-Verlag Berlin Hei