边缘 发表于 2025-3-26 23:23:24
New Covering Radius of Reed-Muller Codes for ,-Resilient Functionser, in order to be secure against an . of linear attacks, we wish to find a t-resilient function . which has a large distance even from low degree Boolean functions. From this point of view, we define a new covering radius .(.) as the maximum distance between a . function . and the r-th order Reed-M反省 发表于 2025-3-27 03:10:11
http://reply.papertrans.cn/87/8642/864142/864142_32.pngincite 发表于 2025-3-27 06:40:11
http://reply.papertrans.cn/87/8642/864142/864142_33.png宪法没有 发表于 2025-3-27 11:39:08
http://reply.papertrans.cn/87/8642/864142/864142_34.png返老还童 发表于 2025-3-27 17:05:32
http://reply.papertrans.cn/87/8642/864142/864142_35.pngcovert 发表于 2025-3-27 18:55:15
http://reply.papertrans.cn/87/8642/864142/864142_36.pngBACLE 发表于 2025-3-28 00:50:06
Algorithms for Multi-exponentiation approach and present an alternative strategy, interleaving exponentiation. Our comparison shows that in general groups, sometimes the conventional method and sometimes interleaving exponentiation is more efficient. In groups where inverting elements is easy (e.g. elliptic curves), interleaving expoBlatant 发表于 2025-3-28 03:26:50
http://reply.papertrans.cn/87/8642/864142/864142_38.pngSMART 发表于 2025-3-28 07:33:46
A Differential Attack on Reduced-Round SC20006.5 rounds, and for 192- and 256-bit keys it consists of 7.5 rounds. In this paper we demonstrate two different 3.5-round differential characteristics that hold with probabilities 2. and 2.. These characteristics can be used to extract up to 32 bits of the first and last round keys in a 4.5-round vaEndoscope 发表于 2025-3-28 11:07:33
http://reply.papertrans.cn/87/8642/864142/864142_40.png