找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security and Cryptology – ICISC 2006; 9th International Co Min Surp Rhee,Byoungcheon Lee Conference proceedings 2006 Springer-V

[复制链接]
查看: 25583|回复: 68
发表于 2025-3-21 16:52:36 | 显示全部楼层 |阅读模式
书目名称Information Security and Cryptology – ICISC 2006
副标题9th International Co
编辑Min Surp Rhee,Byoungcheon Lee
视频video
丛书名称Lecture Notes in Computer Science
图书封面Titlebook: Information Security and Cryptology – ICISC 2006; 9th International Co Min Surp Rhee,Byoungcheon Lee Conference proceedings 2006 Springer-V
出版日期Conference proceedings 2006
关键词RSA; Radio-Frequency Identification (RFID); Routing; authentication; biometrics; block ciphers; collision;
版次1
doihttps://doi.org/10.1007/11927587
isbn_softcover978-3-540-49112-5
isbn_ebook978-3-540-49114-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 2006
The information of publication is updating

书目名称Information Security and Cryptology – ICISC 2006影响因子(影响力)




书目名称Information Security and Cryptology – ICISC 2006影响因子(影响力)学科排名




书目名称Information Security and Cryptology – ICISC 2006网络公开度




书目名称Information Security and Cryptology – ICISC 2006网络公开度学科排名




书目名称Information Security and Cryptology – ICISC 2006被引频次




书目名称Information Security and Cryptology – ICISC 2006被引频次学科排名




书目名称Information Security and Cryptology – ICISC 2006年度引用




书目名称Information Security and Cryptology – ICISC 2006年度引用学科排名




书目名称Information Security and Cryptology – ICISC 2006读者反馈




书目名称Information Security and Cryptology – ICISC 2006读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

1票 100.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:14:43 | 显示全部楼层
Generic Attacks on Symmetric Cipherspecially with respect to DES. An interesting variant of exhaustive search is to use a so-called time-memory trade-off (TMTO) attack. This attack and its many variants will be described and recent research on TMTO attacks will be surveyed. The effectiveness of generic attacks is determined by improve
发表于 2025-3-22 03:56:37 | 显示全部楼层
Improved Collision Attack on the Hash Function Proposed at PKC’98sh computations, while the previous attack of Chang . presented at SAC 2002 has a complexity of about 2. hash computations. In the analysis of the hash function we combined existing approaches with recent results in cryptanalysis of hash functions. We show that message-dependent rotations can be exp
发表于 2025-3-22 08:18:31 | 显示全部楼层
Birthday Paradox for Multi-collisionsshing .=.. times. We first show that this probability is at most 1/.! which is very small for large .. We next show that by hashing (.!). ×. times, an .-collision is found with probability approximately 0.5 for sufficiently large .. Note that if .=2, it coincides with the usual birthday paradox. Hen
发表于 2025-3-22 09:57:31 | 显示全部楼层
New Variant of the Self-Shrinking Generator and Its Cryptographic Propertiese the selection rule is determined by the XORed value of a couple of bits. It is shown that the period and the linear complexity of an output sequence of SSG-XOR are better than those of the self-shrinking generator. It is also shown that the SSG-XOR generator has meaningful advantages from the view
发表于 2025-3-22 14:51:34 | 显示全部楼层
On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher of matrices for increasing efficiency in software implementations of the binary matrix. We estimate a security against cryptanlysis when the binary matrix is used as a diffusion layer of a 256-bit SPN block cipher with an 8-bit s-box as a substitution layer in a round function. Also we describe the
发表于 2025-3-22 18:14:39 | 显示全部楼层
On Algebraic Immunity and Annihilators for computing the optimal annihilator of . and .(.) are inefficient. This work consists of two parts. In the first part, we extend the concept of algebraic immunity. In particular, we argue that a function . may be replaced by another boolean function .. called the algebraic complement of .. This m
发表于 2025-3-22 23:15:04 | 显示全部楼层
High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theoremth modified radix-4 Montgomery multiplication algorithm and Chinese Remainder Theorem (CRT). Our design takes 0.84M clock cycles for a 1024-bit modular exponentiation and 0.25M clock cycles for two 512-bit exponentiations. Using 0.18 um standard cell library, the processor achieves 365Kbps for a 102
发表于 2025-3-23 02:38:44 | 显示全部楼层
发表于 2025-3-23 07:29:04 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-10 23:31
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表