找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Selected Areas in Cryptography; 27th International C Orr Dunkelman,Michael J. Jacobson, Jr.,Colin O‘Fly Conference proceedings 2021 Springe

[复制链接]
楼主: 落后的煤渣
发表于 2025-3-25 04:38:20 | 显示全部楼层
On Index Calculus Algorithms for Subfield Curvescalculus for subfield curves, also called Koblitz curves, defined over . with ECDLP in .. Instead of accelerating the solution of polynomial systems during index calculus as was predominantly done in previous work, we define factor bases that are invariant under the .-power Frobenius automorphism of
发表于 2025-3-25 10:37:18 | 显示全部楼层
Weak-Key Distinguishers for AESs of AES, we perform an extensive analysis of weak-key distinguishers (in the single-key setting) for AES instantiated with the original key-schedule and with the new key-schedule proposed at ToSC/FSE’18. As one of the main results, we show that (almost) all the secret-key distinguishers for round-r
发表于 2025-3-25 13:24:38 | 显示全部楼层
Algebraic Key-Recovery Attacks on Reduced-Round Xoofffcode, stream cipher, key derivation function, authenticated encryption and so on. Farfalle construction relies on a set of permutations and on so-called rolling functions: it can be split into a compression layer followed by a two-step expansion layer..As one instance of Farfalle, Xoofff is very eff
发表于 2025-3-25 16:37:37 | 显示全部楼层
Improved (Related-key) Differential Cryptanalysis on GIFT we apply Matsui’s algorithm to search related-key differential trails of GIFT. We add three constraints to limit the search space and search the optimal related-key differential trails on the limited search space. We obtain related-key differential trails of GIFT-64/128 for up to 15/14 rounds, whic
发表于 2025-3-25 23:14:14 | 显示全部楼层
Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPathto use tools may help designers in this process and give improved cryptanalysis. In this paper we introduce CryptaPath, a tool for doing algebraic cryptanalysis which utilizes Compressed Right-Hand Side (CRHS) equations to attack SPN ciphers and sponge constructions. It requires no previous knowledg
发表于 2025-3-26 04:02:48 | 显示全部楼层
发表于 2025-3-26 06:56:15 | 显示全部楼层
发表于 2025-3-26 12:07:07 | 显示全部楼层
发表于 2025-3-26 12:50:28 | 显示全部楼层
发表于 2025-3-26 16:58:51 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 07:38
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表