找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security and Privacy; 20th Australasian Co Ernest Foo,Douglas Stebila Conference proceedings 2015 Springer International Publis

[复制链接]
楼主: 短暂
发表于 2025-3-28 15:20:08 | 显示全部楼层
发表于 2025-3-28 19:18:43 | 显示全部楼层
0302-9743 15, held in Brisbane, QLD, Australia, in June/July 2015..The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital
发表于 2025-3-29 00:20:01 | 显示全部楼层
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemesird layers and CTR mode in the middle. The weak keys of polynomial evaluation hash in message authentication code and authenticated encryption have been thoroughly analyzed, but have never applied in TES. We point out that XCB, HCTR and HCH (and two variations of HCH: HCHp and HCHfp) can not resist
发表于 2025-3-29 03:45:54 | 显示全部楼层
Cryptanalysis of Reduced-Round ,nalysis on .. Firstly, we focus on security properties at the hash function level by presenting (second) preimage, collision and distinguishing attacks on reduced-round .. In order to launch the preimage attack, we have to slightly tweak the original Meet-in-the-Middle preimage attack framework on .
发表于 2025-3-29 11:12:09 | 显示全部楼层
Improving the Biclique Cryptanalysis of AES constructing bicliques with size . and reducing the number of S-boxes computed in the matching phase. Their results were improved later by better selections of differential characteristics in the biclique construction. In this paper, we improve the biclique attack by increasing the biclique size to
发表于 2025-3-29 14:38:32 | 显示全部楼层
发表于 2025-3-29 18:07:25 | 显示全部楼层
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptionsd allows the sender to dynamically choose the authorized set and the decryption threshold at the time of encryption. Currently, the only known dynamic TPKE scheme is a scheme proposed by Delerablée and Pointcheval (CRYPTO 2008). This scheme is proven to provide message confidentiality under a .-type
发表于 2025-3-29 22:12:36 | 显示全部楼层
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Messagehash functions. In this paper, we show that by utilizing popular Sponge constructions in OAEP framework, we can eliminate the need of such hash functions. We provide a new scheme in OAEP framework based on Sponge construction and call our scheme . (SpAEP). SpAEP is based on 2 functions: Sponge and S
发表于 2025-3-30 00:21:30 | 显示全部楼层
Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS In particular, recent improvements on horizontal power analysis [., .] render ineffective the usual counter-measures which randomize the data at the very beginning of the computations [., .]. To counteract horizontal analysis it is necessary to randomize the computations all along the exponentiatio
发表于 2025-3-30 05:02:28 | 显示全部楼层
Towards Forward Security Properties for PEKS and IBEf the long-term secret keys is compromised in the future. In this paper, we investigate some forward security properties for Public-key Encryption with Keyword Search (PEKS) schemes, which allow a client to store encrypted data and delegate search operations to a server. The proposed properties guar
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-21 17:51
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表