agonist 发表于 2025-3-23 09:54:05
http://reply.papertrans.cn/87/8642/864143/864143_11.pngCANT 发表于 2025-3-23 16:13:35
http://reply.papertrans.cn/87/8642/864143/864143_12.png虚弱 发表于 2025-3-23 20:52:47
A More Compact AES the S-box. For decryption, the improvement is 13.5%. This work may be useful both as a starting point for a bit-sliced software implementation, where reducing operations increases speed, and also for hardware with limited resources.课程 发表于 2025-3-23 22:23:33
Differential Fault Analysis of Rabbitnnot control the exact location of injected faults. Our attack requires around 128 − 256 faults, precomputed table of size 2. bytes and recovers the complete internal state of Rabbit in about 2. steps.judicial 发表于 2025-3-24 06:20:18
An Improved Recovery Algorithm for Decayed AES Key Schedule Imagesell over twice the decay capacity of previous methods. The algorithm is generalized to AES-256 and is empirically shown to recover 256-bit key schedules that have suffered 65% decay. When solutions are unique, the algorithm efficiently validates this property and outputs the solution for memory images decayed up to 60%.范围广 发表于 2025-3-24 08:02:06
http://reply.papertrans.cn/87/8642/864143/864143_16.pngInjunction 发表于 2025-3-24 11:08:57
http://reply.papertrans.cn/87/8642/864143/864143_17.pngADORN 发表于 2025-3-24 18:05:34
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Ci used. As a result, we present the first attack on 7 rounds for the .-256 output transformation and improve the semi-free-start collision attack on 6 rounds. Further, we present an improved known-key distinguisher for 7 rounds of the AES block cipher and the internal permutation used in ..配置 发表于 2025-3-24 21:29:39
Cryptanalysis of Hash Functions with Structuresach under different assumptions on the round functions. The power of the new attack is illustrated with the cryptanalysis of the hash functions Grindahl and the analysis of the SHA-3 candidate Fugue (both functions as 256 and 512 bit versions). The collision attack on Grindahl-512 is the first collision attack on this function.Maximizer 发表于 2025-3-25 02:15:10
New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128ntial attack to reduced–round Camellia. By this attack 12–round Camellia–128 without ./.. functions and whitening is breakable with a total complexity of about 2. encryptions and 2. chosen plaintexts. In terms of the numbers of the attacked rounds, our attack is better than any previously known attack on Camellia–128.