甜食 发表于 2025-3-23 12:49:17
0302-9743 ary, AB, Canada in August 2018. .The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas:.design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC a凹槽 发表于 2025-3-23 14:33:53
http://reply.papertrans.cn/87/8642/864149/864149_12.pngdefray 发表于 2025-3-23 20:14:59
http://reply.papertrans.cn/87/8642/864149/864149_13.png废除 发表于 2025-3-24 01:54:31
http://reply.papertrans.cn/87/8642/864149/864149_14.pngexquisite 发表于 2025-3-24 03:58:51
http://reply.papertrans.cn/87/8642/864149/864149_15.png维持 发表于 2025-3-24 07:25:00
Variants of the AES Key Schedule for Better Truncated Differential Boundsttacks. One way to do so is to determine the minimal number of active S-boxes, and use this number along with the maximal differential probability of the S-box to determine the minimal probability of any differential characteristic. Thus, if one wants to build a new block cipher, one should try to mCANDY 发表于 2025-3-24 13:29:10
Analysis and Improvement of an Authentication Scheme in Incremental Cryptography output like a ciphertext, a signature or an authentication tag after modifying the corresponding input. This property is very valuable in large scale systems where gigabytes of data are continuously processed (e.g. in cloud storage). Adding cryptographic operations on such systems can decrease dramblight 发表于 2025-3-24 18:30:47
Integral Attacks on Round-Reduced Bel-T-256r 256 bits. Bel-T combines a Feistel network with a Lai-Massey scheme to build a complex round function with 7 S-box layers per round then iterate this round function 8 times to construct the whole cipher. In this paper, we present integral attacks against Bel-T-256 using the propagation of the bit-Cardioplegia 发表于 2025-3-24 21:44:17
http://reply.papertrans.cn/87/8642/864149/864149_19.pngSuggestions 发表于 2025-3-25 01:07:55
http://reply.papertrans.cn/87/8642/864149/864149_20.png