找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cryptology and Network Security; 10th International C Dongdai Lin,Gene Tsudik,Xiaoyun Wang Conference proceedings 2011 Springer-Verlag GmbH

[复制链接]
楼主: 连结
发表于 2025-3-25 03:53:37 | 显示全部楼层
发表于 2025-3-25 09:03:28 | 显示全部楼层
y Pan and Deng shows that it is not secure. In this paper, we present a new efficient lattice-based public-key cryptosystem mixed with a knapsack, which can resist Pan and Deng’s attack well. What’s more, it has reasonable key size, quick encryption and decryption. However, we have to point out that the new cryptosystem has no security proof.
发表于 2025-3-25 12:51:16 | 显示全部楼层
Kriterien zur Schadensbewertung,In this survey, we review a number of the many “expressive” encryption systems that have recently appeared from lattices, and explore the innovative techniques that underpin them.
发表于 2025-3-25 17:34:57 | 显示全部楼层
发表于 2025-3-25 20:11:11 | 显示全部楼层
发表于 2025-3-26 03:22:46 | 显示全部楼层
Kriterien zur Schadensbewertung,has been employed in many Mifare Classic RFID products, Hitag2 is used by many car manufacturers for unlocking car doors remotely. Until now, except the brute force attack, only one cryptanalysis on this cipher was released by Courtois, O’Neil and Quisquater, which broke Hitag2 by an SAT solver with
发表于 2025-3-26 05:02:20 | 显示全部楼层
Kriterien zur Werkstoffauswahl,ossible differential of Camellia including ./.. layer. Utilizing impossible differential attack, 10-round Camellia-128 is breakable with 2. chosen plaintexts and 2. 10 round encryptions. Moreover, 10-round Camellia-192 and 11-round Camellia-256 can also be analyzed, the time complexity are about 2.
发表于 2025-3-26 12:11:08 | 显示全部楼层
,Thermisch aktivierte Vorgänge,this paper, we analyze the initialization stage of ZUC v1.5. First of all, we study the differential properties of operations in ZUC v1.5, including the bit-reorganization, exclusive-or and addition modulo 2., bit shift and the update of LFSR. And then we give a differential trail covering 24 rounds
发表于 2025-3-26 16:08:22 | 显示全部楼层
发表于 2025-3-26 19:36:35 | 显示全部楼层
Atomarer Aufbau kristalliner Stoffe,ode (EPC) encryption, which uses low-cost passive RFID-tags and exactly 96 bits as a unique identifier on the item level. EPCBC is based on a generalized PRESENT with block size 48 and 96 bits for the main cipher structure and customized key schedule design which provides strong protection against r
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-25 13:21
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表