找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Selected Areas in Cryptography; 9th Annual Internati Kaisa Nyberg,Howard Heys Conference proceedings 2003 Springer-Verlag Berlin Heidelberg

[复制链接]
楼主: 压缩
发表于 2025-3-23 12:25:54 | 显示全部楼层
Integer Decomposition for Fast Scalar Multiplication on Elliptic Curvest linearly independent vectors. Once a pair of such vectors exists, their decomposition method improves the efficiency of the scalar multiplication roughly about 50%. In this paper, we state and prove a necessary condition for the existence of a pair of desired vectors and we also present an algorithm to find them.
发表于 2025-3-23 15:59:37 | 显示全部楼层
Encryption-Scheme Security in the Presence of Key-Dependent Messagesacle model. By developing and achieving stronger notions of encryption-scheme security it is hoped that protocols which are proven secure under “formal” models of security can, in time, be safely realized by generically instantiating their primitives.
发表于 2025-3-23 18:18:50 | 显示全部楼层
Square-like Attacks on Reduced Rounds of IDEAuires only 103 chosen plaintexts. We have reduced the number of required plaintexts significantly up to 4 rounds. We also present some interesting properties of the reduced round variants of the cipher which have not been published before. The properties and the attacks bring a different approach to analyse the cipher.
发表于 2025-3-24 00:15:50 | 显示全部楼层
A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Functionw error probability. The latter is such that ending the algorithm by an exhaustive search among sequences of limited length is hardly needed. Therefore, the overall complexity of our scheme remains very small and the algorithm appears as an excellent candidate for cryptanalysis of filtered PN-generators.
发表于 2025-3-24 03:41:52 | 显示全部楼层
发表于 2025-3-24 06:46:09 | 显示全部楼层
Multiples of Primitive Polynomials and Their Products over GF(2) the products of primitive polynomials. We here make a detailed analysis on .-nomial multiples of products of primitive polynomials. We present new enumeration results for these multiples and provide some estimation on their degree distribution.
发表于 2025-3-24 11:40:06 | 显示全部楼层
White-Box Cryptography and an AES Implementation the containing application. We partially justify our aes implementation, and motivate its design, by showing how removal of parts of the recommended implementation allows specified attacks, including one utilizing a pattern in the aes . table.
发表于 2025-3-24 18:49:36 | 显示全部楼层
发表于 2025-3-24 20:04:28 | 显示全部楼层
On Propagation Characteristics of Resilient Functionsessary condition for construction of functions with good autocorrelation properties. We conclude by a study of the main constructions of resilient functions. We notably show how to avoid linear structures when a linear concatenation is used and when the recursive construction introduced in [.] is chosen.
发表于 2025-3-24 23:43:45 | 显示全部楼层
Modifications of ECDSAcate signatures. The second variant is also secure against existential forgery but we argue that it is likely to possess only four natural duplicate signatures. Our variants of ECDSA are analogous to the variants of DSA as proposed by Brickell .. However, we show that the ECDSA variants have better
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-23 23:48
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表