找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security and Cryptology - ICISC 2007; 10th International C Kil-Hyun Nam,Gwangsoo Rhee Conference proceedings 2007 Springer-Verl

[复制链接]
楼主: Flange
发表于 2025-3-23 11:16:47 | 显示全部楼层
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVALcollision attack, our method focuses on the multi-collision of the compression function. For MD4, we utilize two different feasible collision differential paths to find a 4-collision with about 2. MD4 computations. For 3-Pass HAVAL, we can find a 4-collision with complexity about 2. and a 8-near-collision with complexity 2..
发表于 2025-3-23 16:35:52 | 显示全部楼层
发表于 2025-3-23 21:30:46 | 显示全部楼层
Cryptanalysis of a Hash Function Proposed at ICISC 2006A simple method for constructing collisions for Shpilrain’s polynomial-based hash function from ICISC 2006 is presented. The attack relies on elementary linear algebra and can be considered as practical: For the parameters suggested, we give a specific collision, computed by means of a computer algebra system.
发表于 2025-3-23 22:35:01 | 显示全部楼层
Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006ID. In this paper, we present an impossible differential attack on 25-round HIGHT, a related-key rectangle attack on 26-round HIGHT, and finally a related-key impossible differential attack on 28-round HIGHT. Our result suggests that the safety margin of HIGHT decreases from the originally expected
发表于 2025-3-24 03:03:09 | 显示全部楼层
A Cryptanalysis of the Double-Round Quadratic Cryptosystemlthough these first schemes were broken, many others followed, leading to a very active field known as Multivariate cryptography. In this paper, we show how to break one of these schemes, the Double-Round Quadratic cryptosystem from [12]. We stress that this cryptosystem has, in practice, already be
发表于 2025-3-24 08:08:38 | 显示全部楼层
Improving the Time Complexity of Matsui’s Linear Cryptanalysis Fourier Transform. Using this improvement, the time complexity decreases from .(2.*2.) to .(.*2.), where . is the number of bits in the keyguess. This improvement is very generic and can be applied against a broad variety of ciphers including SPN and Feistel schemes. In certain (practically meaning
发表于 2025-3-24 13:46:58 | 显示全部楼层
On Large Distributions for Linear Cryptanalysisn . (or a noise variable) be expressed via . mutually independent and uniformly distributed .-bit random variables .., .., ..., ... The possibility to construct its distribution depends on the form of the expression ., and sometimes it becomes a bottleneck of the cryptanalysis..In this paper we prop
发表于 2025-3-24 16:33:46 | 显示全部楼层
发表于 2025-3-24 20:36:02 | 显示全部楼层
Side Channel Attacks on Irregularly Decimated Generatorspping fault analysis. We also modify the attacks to non side-channel cryptanalyses, but on the assumption that the key/IV mixing is not well designed. This paper hopes to provide more understanding on actual hardware implementations of IDG as cipher components. Finally, we combine our fault analysis
发表于 2025-3-25 01:36:14 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-5 04:11
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表