lobster 发表于 2025-3-25 07:19:06
Key-Schedule Cryptanalysis of DEALncrypted under each key, and may be implemented with a variety of time-memory tradeoffs; Given 3 × 2. bytes of memory, the attack requires 2. DES encryptions, and given 3 × 2. bytes of memory, the attack requires 2. DES encryptions. We conclude with some questions raised by the analysis.核心 发表于 2025-3-25 10:53:01
Pseudonym Systemsudonym systems where users are motivated not to share their identity, and in which the trusted center’s involvement is minimal. We give theoretical constructions for such systems based on any one-way function. We also suggest an efficient and easy-to-implement practical scheme.全部逛商店 发表于 2025-3-25 12:57:51
http://reply.papertrans.cn/87/8642/864138/864138_23.pngVICT 发表于 2025-3-25 16:52:04
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures period. Furthermore, we introduce some combinatorial structure into the proactive scheme to make the scheme more efficient. The combinatorial method might also be used to improve some of the previously constructed proactive schemes.卜闻 发表于 2025-3-25 22:48:48
http://reply.papertrans.cn/87/8642/864138/864138_25.png雪白 发表于 2025-3-26 01:29:00
A Universal Encryption Standard While the cryptographic community is working hard to select and evaluate candidates and finalists for the AES (Advanced Encryption Standard) contest launched by NIST in 1997, it might be of interest to propose a secure and simple double block-length encryption algorithm. More than in terms of key lextract 发表于 2025-3-26 07:45:26
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generatyptographic primitive, and the design principles used to develop Yarrow. We then discuss the ways that PRNGs can fail in practice, which motivates our discussion of the components of Yarrow and how they make Yarrow secure. Next, we define a specific instance of a PRNG in the Yarrow family that makesblithe 发表于 2025-3-26 11:13:31
http://reply.papertrans.cn/87/8642/864138/864138_28.png舰旗 发表于 2025-3-26 14:30:34
Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomnessprovides security against non-adaptive iterated attacks. In this paper we define a new matrix norm dedicated to adaptive chosen plaintext attacks. Similarly, we construct another matrix norm dedicated to chosen plaintext and ciphertext attacks..The formalism from decorrelation enables to manipulateAVOID 发表于 2025-3-26 19:35:45
http://reply.papertrans.cn/87/8642/864138/864138_30.png