找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Selected Areas in Cryptography; 9th Annual Internati Kaisa Nyberg,Howard Heys Conference proceedings 2003 Springer-Verlag Berlin Heidelberg

[复制链接]
楼主: 压缩
发表于 2025-3-25 04:17:00 | 显示全部楼层
Integer Decomposition for Fast Scalar Multiplication on Elliptic Curvesvarious speedup techniques for the scalar multiplication have been developed. Recently, Gallant .. published a method that accelerates the scalar multiplication and is applicable to a larger class of curves [.]. In the process of their method, they assumed the existence of a special pair of two shor
发表于 2025-3-25 08:22:33 | 显示全部楼层
发表于 2025-3-25 14:51:41 | 显示全部楼层
Encryption-Scheme Security in the Presence of Key-Dependent Messagese, one encrypts using a shared key . the value .. Here we introduce a new notion of security, KDM security, appropriate for key-dependent messages. The notion makes sense in both the publickey and shared-key settings. For the latter we show that KDM security is easily achievable within the random-or
发表于 2025-3-25 17:41:30 | 显示全部楼层
On the Security of CTR + CBC-MACe CTR (“counter”) encryption mode with CBC-MAC message authentication and is based on a block cipher such as AES. We present concrete lower bounds for the security of CCM in terms of the security of the underlying block cipher. The conclusion is that CCM provides a level of privacy and authenticity
发表于 2025-3-25 23:31:46 | 显示全部楼层
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing encryption scheme using a cryptographic pseudorandom-number generator, this objective can be achieved by the simple combination of encryption and MAC generation. This naive approach, however, introduces the following drawbacks; the implementation is likely to require two scans of the data, and inde
发表于 2025-3-26 01:51:01 | 显示全部楼层
发表于 2025-3-26 07:06:14 | 显示全部楼层
Higher Order Differential Attack of ,(II) key is attackable by Higher Order Differential Attack and even if FL function is included, 9 round variant is attackable by Square Attack. In this paper, we present a new attack of . using 16-th order Differential and show that 11 round variant without FL function is attackable. Moreover, we show t
发表于 2025-3-26 10:34:55 | 显示全部楼层
Square-like Attacks on Reduced Rounds of IDEAgorithm and are based on the observation that suitable chosen plaintexts give rise to some special kind of distributions which provide a way to distinguish reduced round IDEA output from a random permutation with very few plaintexts. As a result, we develop an attack for 3.5 rounds of IDEA which req
发表于 2025-3-26 15:20:48 | 显示全部楼层
发表于 2025-3-26 17:57:24 | 显示全部楼层
On Propagation Characteristics of Resilient Functionsst introduce a new upper bound on nonlinearity of a given resilient function depending on the propagation criterion. We later show that a large class of resilient functions admit a linear structure; more generally, we exhibit some divisibility properties concerning the Walsh-spectrum of the derivati
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-23 23:52
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表