友好 发表于 2025-3-28 18:20:14

http://reply.papertrans.cn/88/8795/879477/879477_41.png

匍匐前进 发表于 2025-3-28 19:58:55

The Blum-Blum-Shub Generator and Related CiphersThis chapter covers stream ciphers with security proofs with a special focus on the Blum-Blum-Shub generator the most important cipher of that type. We will learn what security proofs are, what they can do for us and what they can’t do for us.

字谜游戏 发表于 2025-3-29 02:09:10

http://reply.papertrans.cn/88/8795/879477/879477_43.png

支架 发表于 2025-3-29 03:34:18

Number TheoryMany ciphers with security proof including the Blum-Blum-Shub generator base on number theory problems. This chapter collect the parts of number theory necessary to understand the security proofs and the attacks.

absolve 发表于 2025-3-29 09:05:36

http://reply.papertrans.cn/88/8795/879477/879477_45.png

武器 发表于 2025-3-29 11:32:10

http://reply.papertrans.cn/88/8795/879477/879477_46.png

怪物 发表于 2025-3-29 17:38:36

http://reply.papertrans.cn/88/8795/879477/879477_47.png

conception 发表于 2025-3-29 23:31:29

Andreas KleinProvides a detailed introduction to stream ciphers including history, mathematics and many examples.Contains many useful exercises and solutions.Features many real-world applications like the security

mortgage 发表于 2025-3-30 02:11:23

978-1-4471-5078-7Springer-Verlag London 2013

桉树 发表于 2025-3-30 05:13:32

Non-linear Combinations of LFSRss of LFSRs. In this chapter we will meet for the first time the three big attack classes (correlation attacks, algebraic attacks, time-memory trade-off attacks). Which are central elements in the following chapters.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Stream Ciphers; Andreas Klein Textbook 2013 Springer-Verlag London 2013 Cryptographic ciphers.RC4.Stream ciphers