找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Selected Areas in Cryptography; 11th International W Helena Handschuh,M. Anwar Hasan Conference proceedings 2005 Springer-Verlag Berlin Hei

[复制链接]
楼主: BROOD
发表于 2025-3-27 00:22:43 | 显示全部楼层
发表于 2025-3-27 04:20:54 | 显示全部楼层
Collision Attack and Pseudorandomness of Reduced-Round Camellia random permutation of the blocks space. By using collision-searching techniques, the distinguishers are used to attack 6,7,8 and 9 rounds of Camellia with 128-bit key and 8,9 and 10 rounds of Camellia with 192/256-bit key. The attack on 6-round of 128-bit key Camellia is more efficient than known a
发表于 2025-3-27 06:55:41 | 显示全部楼层
Password Based Key Exchange with Mutual Authenticationd later by Gennaro and Lindell [13]. However, these protocols do not support mutual authentication (MA). The authors explained that this could be achieved by adding an additional flow. But then this protocol turns out to be 4-round. As it is known that a high entropy secret based key exchange protoc
发表于 2025-3-27 12:02:09 | 显示全部楼层
Extending the Resynchronization Attackrd attack with cryptanalytic techniques such as algebraic attacks and linear cryptanalysis. Our results show that using linear resync mechanisms should be avoided, and provide lower bounds for the nonlinearity required from a secure resync mechanism.
发表于 2025-3-27 17:39:09 | 显示全部楼层
Perfect Diffusion Primitives for Block Ciphers lead to interesting combinatorial problems: how to maximize the number of occurrences of 1 in those matrices, and how to minimize the number of pairwise different entries. We investigate these problems and construct efficient 4 × 4 and 8 × 8 MDS matrices to be used e.g. in block ciphers.
发表于 2025-3-27 18:12:08 | 显示全部楼层
发表于 2025-3-28 01:24:25 | 显示全部楼层
A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogueintroduce a left-to-right recoding with the same digit set as the .-NAF, generalizing previous results. We also prove that the two recodings have the same (optimal) weight. Finally, we sketch how to prove similar results for other recodings.
发表于 2025-3-28 03:08:51 | 显示全部楼层
Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexitys not need any irreducibility testing when there is a Gaussian normal basis of type (2,3) in .(..). We show that our algorithms are simple to implement and the time complexity of our methods are comparable to the best ones proposed so far.
发表于 2025-3-28 09:21:47 | 显示全部楼层
发表于 2025-3-28 12:26:04 | 显示全部楼层
Password Based Key Exchange with Mutual Authentication an efficient construction in the common reference string (CRS) model. Our protocol is even simpler than that of Katz, . Furthermore, we show that our protocol is secure under the DDH assumption (. random oracle).
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-4 02:34
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表