找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Selected Areas in Cryptography; 9th Annual Internati Kaisa Nyberg,Howard Heys Conference proceedings 2003 Springer-Verlag Berlin Heidelberg

[复制链接]
楼主: 压缩
发表于 2025-3-27 00:19:29 | 显示全部楼层
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q)(ii) a weakness of the construction of the resilient functions over GF(.) proposed at CRYPTO’96. Two corresponding methods for cryptanalysis are proposed. It is shown that although certain keystream generators over GF(.) are resistant against correlation and linear complexity based attacks, they are
发表于 2025-3-27 03:42:01 | 显示全部楼层
发表于 2025-3-27 05:51:35 | 显示全部楼层
A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function function and the LFSR structure so as to introduce a new iterative decoding technique. The results we obtained prove to be very good: indeed, even in the case of systems for which classical iterative algorithms appear powerless, our scheme enables us to recover the LFSR initial state with a very lo
发表于 2025-3-27 10:28:49 | 显示全部楼层
发表于 2025-3-27 14:30:43 | 显示全部楼层
Luby-Racko. Ciphers: Why XOR Is Not So Exclusivenary operation in an arbitrary finite group. We obtain various interesting results in this context: - First, we analyze the security of three-round Feistel ladders over arbitrary groups. We examine various Luby-Racko. ciphers known to be insecure when XOR is used. In some cases, we can break these c
发表于 2025-3-27 19:20:06 | 显示全部楼层
New Results on Unconditionally Secure Distributed Oblivious Transfer and a Receiver is interested in one of them. During a set up phase, the Sender gives information about the secrets to . servers. Afterwards, in a recovering phase, the receiver can compute the secret she wishes by interacting with . of them. More precisely, from the answers received she computes th
发表于 2025-3-28 00:39:38 | 显示全部楼层
On the Security of CTR + CBC-MAC the security of CCM in terms of the security of the underlying block cipher. The conclusion is that CCM provides a level of privacy and authenticity that is in line with other proposed modes such as OCB.
发表于 2025-3-28 03:34:47 | 显示全部楼层
Higher Order Differential Attack of ,(II)per, we present a new attack of . using 16-th order Differential and show that 11 round variant without FL function is attackable. Moreover, we show that 11 round variant with FL function is attackable, if we use chosen ciphertexts for this attack.
发表于 2025-3-28 06:19:26 | 显示全部楼层
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC’98valanche Criterion). This paper improves their attack and shows that we can find a collision pair from the original version of the hash function with probability 2-37.13 through the improved method. Furthermore we point out a weakness of the function comes from shift values dependent on message.
发表于 2025-3-28 11:19:50 | 显示全部楼层
Francesco Sica,Mathieu Ciet,Jean-Jacques Quisquater
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-23 18:49
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表