找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Selected Areas in Cryptography; 5th Annual Internati Stafford Tavares,Henk Meijer Conference proceedings 1999 Springer-Verlag Berlin Heidel

[复制链接]
楼主: 铲除
发表于 2025-3-25 04:20:13 | 显示全部楼层
Feistel Ciphers with , ,-Decorrelationthe GF(2.)-arithmetics, the other based on the . mod . mod 2. primitive with a prime . 2.(1 + δ ). In this paper we show how to achieve similar decorrelation with a prime . 2.(1 - δ ). For this we have to change the choice of the norm in the decorrelation theory and replace the L. norm by the L. nor
发表于 2025-3-25 07:40:58 | 显示全部楼层
Key-Dependent S-Box Manipulationsfish. We focus on CAST-128 and consider Blowfish; Biham and Biryukov [.] have made some similar proposals for DES. The method discussed uses bits of the primary key to directly manipulate the s-boxes in such a way that their contents are changed but their cryptographic properties are preserved. Such
发表于 2025-3-25 12:47:18 | 显示全部楼层
On the Twofish Key Scheduleaper, we briefly review the structure of Twofish, and then discuss the key schedule of Twofish, and its resistance to attack. We close with some open questions on the security of Twofish’s key schedule.
发表于 2025-3-25 19:04:22 | 显示全部楼层
Towards Provable Security of Substitution-Permutation Encryption Networksn and the XOR table distribution. Based on the idea that mixing small weak transformations results in a large strong cipher, we provide some evidence which shows that a basic SPN converges to a randomly generated s-box with the same dimensions as the SPN after enough number of rounds. We also presen
发表于 2025-3-25 23:09:01 | 显示全部楼层
发表于 2025-3-26 00:54:09 | 显示全部楼层
Computational Alternatives to Random Number Generatorsquality (malicious or accidental). By opposition to all past state-machine models, we assume that the signer is a memoryless automaton that starts from some internal state, receives a message, outputs its signature and returns . to the same initial state; therefore, the new technique . converts rand
发表于 2025-3-26 06:53:59 | 显示全部楼层
发表于 2025-3-26 09:12:17 | 显示全部楼层
Higher Order Differential Attack Using Chosen Higher Order Differencesr differential by choosing higher order differences. It follows that the designers of a block cipher can evaluate the lower bound of the number of chosen plaintexts and the complexity required for the higher order differential attack. We demonstrate an improved higher order differential attack of a
发表于 2025-3-26 15:26:29 | 显示全部楼层
发表于 2025-3-26 19:19:53 | 显示全部楼层
Cryptanalysis of RC4-like Cipherse to date. In this paper, alleged RC4 (hereafter called RC4) is described and existing analysis outlined. The properties of RC4, and in particular its cycle structure, are discussed. Several variants of a basic “tracking” attack are described, and we provide experimental results on their success for
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-10 09:32
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表