西瓜 发表于 2025-3-25 04:20:13
Feistel Ciphers with , ,-Decorrelationthe GF(2.)-arithmetics, the other based on the . mod . mod 2. primitive with a prime . 2.(1 + δ ). In this paper we show how to achieve similar decorrelation with a prime . 2.(1 - δ ). For this we have to change the choice of the norm in the decorrelation theory and replace the L. norm by the L. nor清真寺 发表于 2025-3-25 07:40:58
Key-Dependent S-Box Manipulationsfish. We focus on CAST-128 and consider Blowfish; Biham and Biryukov [.] have made some similar proposals for DES. The method discussed uses bits of the primary key to directly manipulate the s-boxes in such a way that their contents are changed but their cryptographic properties are preserved. SuchKeratin 发表于 2025-3-25 12:47:18
On the Twofish Key Scheduleaper, we briefly review the structure of Twofish, and then discuss the key schedule of Twofish, and its resistance to attack. We close with some open questions on the security of Twofish’s key schedule.FLAGR 发表于 2025-3-25 19:04:22
Towards Provable Security of Substitution-Permutation Encryption Networksn and the XOR table distribution. Based on the idea that mixing small weak transformations results in a large strong cipher, we provide some evidence which shows that a basic SPN converges to a randomly generated s-box with the same dimensions as the SPN after enough number of rounds. We also presen事与愿违 发表于 2025-3-25 23:09:01
http://reply.papertrans.cn/87/8642/864139/864139_25.png大方一点 发表于 2025-3-26 00:54:09
Computational Alternatives to Random Number Generatorsquality (malicious or accidental). By opposition to all past state-machine models, we assume that the signer is a memoryless automaton that starts from some internal state, receives a message, outputs its signature and returns . to the same initial state; therefore, the new technique . converts randacolyte 发表于 2025-3-26 06:53:59
http://reply.papertrans.cn/87/8642/864139/864139_27.pngenlist 发表于 2025-3-26 09:12:17
Higher Order Differential Attack Using Chosen Higher Order Differencesr differential by choosing higher order differences. It follows that the designers of a block cipher can evaluate the lower bound of the number of chosen plaintexts and the complexity required for the higher order differential attack. We demonstrate an improved higher order differential attack of a关节炎 发表于 2025-3-26 15:26:29
http://reply.papertrans.cn/87/8642/864139/864139_29.pngLEERY 发表于 2025-3-26 19:19:53
Cryptanalysis of RC4-like Cipherse to date. In this paper, alleged RC4 (hereafter called RC4) is described and existing analysis outlined. The properties of RC4, and in particular its cycle structure, are discussed. Several variants of a basic “tracking” attack are described, and we provide experimental results on their success for