找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security and Cryptology; 8th International Co Mirosław Kutyłowski,Moti Yung Conference proceedings 2013 Springer-Verlag Berlin

[复制链接]
楼主: intrinsic
发表于 2025-3-28 16:32:02 | 显示全部楼层
Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN,lternating block ciphers. The algorithm was previously used by Cho [5] to compute estimates of expected squared correlations and capacities of multidimensional linear approximations of PRESENT. The goal of this paper is to investigate the applicability and usefulness of this algorithm for a nonbinar
发表于 2025-3-28 21:28:55 | 显示全部楼层
Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraichave optimal algebraic degree and good nonlinearity. Further, we prove that the functions of this class have at least sub-maximum algebraic immunity. We also check that, at least for small values of the number of variables, the functions of this class have very good nonlinearity, maximum algebraic i
发表于 2025-3-29 00:30:20 | 显示全部楼层
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Ges. The main idea behind our attack is creating several look-up tables and finally recovering the initial states of .. and .. synchronously, by alternatively deriving the initial states of .. and .. along the chains. We show that our attack is more efficient, and improves the previous attacks on the
发表于 2025-3-29 03:23:26 | 显示全部楼层
curing InfiniBand networks with encryption and packet inspection. Unfortunately, the performance benefits realized via the use of remote direct memory access by InfiniBand are at odds with many kernel-stack-based IP datagram encryption and network monitoring technologies. As a result, it is necessar
发表于 2025-3-29 11:04:38 | 显示全部楼层
发表于 2025-3-29 15:29:28 | 显示全部楼层
Sk Subidh Ali,Debdeep Mukhopadhyay tools, such as debuggers and application profilers, do not support tracing through heterogeneous executions that span multiple hosts. In a decentralized system, each host maintains the authoritative record of its own activity in the form of a dependency graph. Reconstructing the provenance of an ob
发表于 2025-3-29 17:05:52 | 显示全部楼层
发表于 2025-3-29 23:14:54 | 显示全部楼层
Yang Li,Kazuo Ohta,Kazuo Sakiyamactor: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, tra
发表于 2025-3-30 03:11:53 | 显示全部楼层
发表于 2025-3-30 05:45:25 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-11 16:42
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表