友好 发表于 2025-3-28 18:20:14
http://reply.papertrans.cn/88/8795/879477/879477_41.png匍匐前进 发表于 2025-3-28 19:58:55
The Blum-Blum-Shub Generator and Related CiphersThis chapter covers stream ciphers with security proofs with a special focus on the Blum-Blum-Shub generator the most important cipher of that type. We will learn what security proofs are, what they can do for us and what they can’t do for us.字谜游戏 发表于 2025-3-29 02:09:10
http://reply.papertrans.cn/88/8795/879477/879477_43.png支架 发表于 2025-3-29 03:34:18
Number TheoryMany ciphers with security proof including the Blum-Blum-Shub generator base on number theory problems. This chapter collect the parts of number theory necessary to understand the security proofs and the attacks.absolve 发表于 2025-3-29 09:05:36
http://reply.papertrans.cn/88/8795/879477/879477_45.png武器 发表于 2025-3-29 11:32:10
http://reply.papertrans.cn/88/8795/879477/879477_46.png怪物 发表于 2025-3-29 17:38:36
http://reply.papertrans.cn/88/8795/879477/879477_47.pngconception 发表于 2025-3-29 23:31:29
Andreas KleinProvides a detailed introduction to stream ciphers including history, mathematics and many examples.Contains many useful exercises and solutions.Features many real-world applications like the securitymortgage 发表于 2025-3-30 02:11:23
978-1-4471-5078-7Springer-Verlag London 2013桉树 发表于 2025-3-30 05:13:32
Non-linear Combinations of LFSRss of LFSRs. In this chapter we will meet for the first time the three big attack classes (correlation attacks, algebraic attacks, time-memory trade-off attacks). Which are central elements in the following chapters.