边缘 发表于 2025-3-26 23:23:24

New Covering Radius of Reed-Muller Codes for ,-Resilient Functionser, in order to be secure against an . of linear attacks, we wish to find a t-resilient function . which has a large distance even from low degree Boolean functions. From this point of view, we define a new covering radius .(.) as the maximum distance between a . function . and the r-th order Reed-M

反省 发表于 2025-3-27 03:10:11

http://reply.papertrans.cn/87/8642/864142/864142_32.png

incite 发表于 2025-3-27 06:40:11

http://reply.papertrans.cn/87/8642/864142/864142_33.png

宪法没有 发表于 2025-3-27 11:39:08

http://reply.papertrans.cn/87/8642/864142/864142_34.png

返老还童 发表于 2025-3-27 17:05:32

http://reply.papertrans.cn/87/8642/864142/864142_35.png

covert 发表于 2025-3-27 18:55:15

http://reply.papertrans.cn/87/8642/864142/864142_36.png

BACLE 发表于 2025-3-28 00:50:06

Algorithms for Multi-exponentiation approach and present an alternative strategy, interleaving exponentiation. Our comparison shows that in general groups, sometimes the conventional method and sometimes interleaving exponentiation is more efficient. In groups where inverting elements is easy (e.g. elliptic curves), interleaving expo

Blatant 发表于 2025-3-28 03:26:50

http://reply.papertrans.cn/87/8642/864142/864142_38.png

SMART 发表于 2025-3-28 07:33:46

A Differential Attack on Reduced-Round SC20006.5 rounds, and for 192- and 256-bit keys it consists of 7.5 rounds. In this paper we demonstrate two different 3.5-round differential characteristics that hold with probabilities 2. and 2.. These characteristics can be used to extract up to 32 bits of the first and last round keys in a 4.5-round va

Endoscope 发表于 2025-3-28 11:07:33

http://reply.papertrans.cn/87/8642/864142/864142_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Selected Areas in Cryptography; 8th Annual Internati Serge Vaudenay,Amr M. Youssef Conference proceedings 2001 Springer-Verlag Berlin Heide