找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Selected Areas in Cryptography; 15th Annual Internat Roberto Maria Avanzi,Liam Keliher,Francesco Sica Conference proceedings 2009 Springer-

[复制链接]
楼主: Defect
发表于 2025-3-26 23:43:59 | 显示全部楼层
发表于 2025-3-27 04:07:29 | 显示全部楼层
The Cryptanalysis of Reduced-Round SMS4(it is used in wireless networks in China) and a range of differential attacks break up to 21 of the 32 rounds used in SMS4. Here we consider the application of linear cryptanalysis to the cipher and we demonstrate a simple attack on 22 rounds of SMS4. We also consider some advanced linear cryptanal
发表于 2025-3-27 07:36:43 | 显示全部楼层
发表于 2025-3-27 11:24:44 | 显示全部楼层
Lifting and Elliptic Curve Discrete Logarithmsndex calculus is a lifting algorithm that solves the classical finite field discrete logarithm problem in subexponential time, but no such algorithm is known in general for elliptic curves. It turns out that there are four distinct lifting scenarios that one can use in attempting to solve the ECDLP;
发表于 2025-3-27 16:09:44 | 显示全部楼层
发表于 2025-3-27 18:23:32 | 显示全部楼层
发表于 2025-3-28 01:22:51 | 显示全部楼层
发表于 2025-3-28 05:09:40 | 显示全部楼层
Counting Functions for the ,-Error Linear Complexity of 2,-Periodic Binary Sequences decrease drastically when a few symbols are changed. Hence there has been considerable interest in the .-error linear complexity of sequences which measures this instability in linear complexity. For 2.-periodic sequences it is known that minimum number of changes needed per period to lower the lin
发表于 2025-3-28 07:06:48 | 显示全部楼层
On the Exact Success Rate of Side Channel Analysis in the Gaussian Modelards. Faced with this threat, it is of crucial importance to precisely determine what is achievable by a given side channel adversary against a cryptosystem producing a given side channel leakage. This can be answered by evaluating the success rate of an attack according to the adversary capacities
发表于 2025-3-28 11:11:32 | 显示全部楼层
Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registersed by a non linear Boolean function. In this paper we focus on the dual construction, namely a linearly filtered Non linear Feedback Shift Register (NFSR). We show that the existing algebraic and correlation attacks against the filter generator can be transposed to mount algebraic or correlation att
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-23 05:38
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表