找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security and Cryptology; 7th International Co Chuan-Kun Wu,Moti Yung,Dongdai Lin Conference proceedings 2012 Springer-Verlag Be

[复制链接]
楼主: architect
发表于 2025-3-30 12:06:16 | 显示全部楼层
发表于 2025-3-30 13:55:45 | 显示全部楼层
发表于 2025-3-30 16:46:03 | 显示全部楼层
Non-interactive Deniable Authentication Protocols,a key-compromise-impersonation attack. We analyze some NIDA protocols in the model, and we find that no one is satisfactory. We give a new paradigm to construct an NIDA protocol, which is provably secure in the model.
发表于 2025-3-30 21:53:12 | 显示全部楼层
On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3,loiting the bias in the carry cells of a Galois FCSR. In order to resist this attack, at SAC 2009 F. Arnault . proposed the new stream cipher F-FCSR-H v3 based upon a ring FCSR. M. Hell and T. Johansson only presented experimental results but no theoretical results for the success probability of the
发表于 2025-3-31 03:05:02 | 显示全部楼层
Efficient Self-certified Signatures with Batch Verification,e concept of . public key was put forth by Girault. In this paper, we propose an efficient and novel self-certified signature scheme, which requires only one modular multiplication in signing with pre-computation. One of features of our scheme lies in its batch verification in both single-signer and
发表于 2025-3-31 06:11:32 | 显示全部楼层
发表于 2025-3-31 10:50:41 | 显示全部楼层
发表于 2025-3-31 14:41:14 | 显示全部楼层
Weak-Key Class of MISTY1 for Related-Key Differential Attack,e algorithm, a weak-key class encompassing 2. weak keys of MISTY1 is found. Then we present 7-round related-key differential characteristics of MISTY1 under the weak-key class, which lead to the attacks on the 8-round MISTY1 without the first . lay. The attack requires 2. chosen ciphertexts, and the
发表于 2025-3-31 17:37:18 | 显示全部楼层
Cryptanalysis of Reduced-Round KLEIN Block Cipher,st investigate the security of KLEIN against truncated differential analysis. We construct a 6-round truncated differential distinguisher based on a careful observation about the characteristic of KLEIN round function. With the help of this new distinguisher, we give a truncated differential analysi
发表于 2025-3-31 23:05:59 | 显示全部楼层
An Efficient RSA Implementation without Precomputation,putation. Precomputation improves the speed and in the meanwhile makes the algorithms more complex. The complex algorithms are not suitable for hardware implementation. We propose a new algorithm without precomputation, which is more efficient even compared with the ones with precomputation. Our alg
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-1 18:44
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表