Gorilla 发表于 2025-3-26 22:56:08
http://reply.papertrans.cn/87/8642/864143/864143_31.pngFIN 发表于 2025-3-27 04:02:53
Optimization Strategies for Hardware-Based Cofactorizationthe cofactorization step on a hardware cluster. An optimal distribution of bitlength-specific ECM modules is proposed and compared to existing ones. With our optimizations we obtain a speedup between 17% and 33% of the cofactorization step of the GNFS when compared to the runtime of an unoptimized cFAWN 发表于 2025-3-27 07:12:51
More on the Security of Linear RFID Authentication Protocols most promising suggestions were those of the .-familiy (.., .., Trusted., ...) initially introduced by Juels and Weis, which are provably secure (via reduction to the Learning Parity with Noise (LPN) problem) against passive and some kinds of active attacks. Their main drawbacks are large amounts o神经 发表于 2025-3-27 09:34:03
Differential Fault Analysis of Rabbit cipher project and is a member of eSTREAM software portfolio. In this paper, we present a practical fault analysis attack on Rabbit. The fault model in which we analyze the cipher is the one in which the attacker is assumed to be able to fault a random bit of the internal state of the cipher but ca异教徒 发表于 2025-3-27 16:53:42
An Improved Recovery Algorithm for Decayed AES Key Schedule Imagesty, dubbed the ., as a serious vulnerability for several widespread software-based encryption packages. Our algorithm recovers AES-128 key schedules tens of millions of times faster than the original proof-of-concept release. In practice, it enables reliable recovery of key schedules at 70% decay, wseduce 发表于 2025-3-27 18:14:10
http://reply.papertrans.cn/87/8642/864143/864143_36.png培养 发表于 2025-3-27 22:36:01
http://reply.papertrans.cn/87/8642/864143/864143_37.png委派 发表于 2025-3-28 02:12:14
http://reply.papertrans.cn/87/8642/864143/864143_38.pngadj忧郁的 发表于 2025-3-28 07:49:04
New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128lications. In this paper, using the redundancy in the key schedule and accelerating the filtration of wrong pairs, we present a new impossible differential attack to reduced–round Camellia. By this attack 12–round Camellia–128 without ./.. functions and whitening is breakable with a total complexityGrating 发表于 2025-3-28 13:12:19
http://reply.papertrans.cn/87/8642/864143/864143_40.png