找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Selected Areas in Cryptography; 16th International W Michael J. Jacobson,Vincent Rijmen,Reihaneh Safavi Conference proceedings 2009 Springe

[复制链接]
楼主: 不友善
发表于 2025-3-23 09:54:05 | 显示全部楼层
发表于 2025-3-23 16:13:35 | 显示全部楼层
发表于 2025-3-23 20:52:47 | 显示全部楼层
A More Compact AES the S-box. For decryption, the improvement is 13.5%. This work may be useful both as a starting point for a bit-sliced software implementation, where reducing operations increases speed, and also for hardware with limited resources.
发表于 2025-3-23 22:23:33 | 显示全部楼层
Differential Fault Analysis of Rabbitnnot control the exact location of injected faults. Our attack requires around 128 − 256 faults, precomputed table of size 2. bytes and recovers the complete internal state of Rabbit in about 2. steps.
发表于 2025-3-24 06:20:18 | 显示全部楼层
An Improved Recovery Algorithm for Decayed AES Key Schedule Imagesell over twice the decay capacity of previous methods. The algorithm is generalized to AES-256 and is empirically shown to recover 256-bit key schedules that have suffered 65% decay. When solutions are unique, the algorithm efficiently validates this property and outputs the solution for memory images decayed up to 60%.
发表于 2025-3-24 08:02:06 | 显示全部楼层
发表于 2025-3-24 11:08:57 | 显示全部楼层
发表于 2025-3-24 18:05:34 | 显示全部楼层
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Ci used. As a result, we present the first attack on 7 rounds for the .-256 output transformation and improve the semi-free-start collision attack on 6 rounds. Further, we present an improved known-key distinguisher for 7 rounds of the AES block cipher and the internal permutation used in ..
发表于 2025-3-24 21:29:39 | 显示全部楼层
Cryptanalysis of Hash Functions with Structuresach under different assumptions on the round functions. The power of the new attack is illustrated with the cryptanalysis of the hash functions Grindahl and the analysis of the SHA-3 candidate Fugue (both functions as 256 and 512 bit versions). The collision attack on Grindahl-512 is the first collision attack on this function.
发表于 2025-3-25 02:15:10 | 显示全部楼层
New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128ntial attack to reduced–round Camellia. By this attack 12–round Camellia–128 without ./.. functions and whitening is breakable with a total complexity of about 2. encryptions and 2. chosen plaintexts. In terms of the numbers of the attacked rounds, our attack is better than any previously known attack on Camellia–128.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-4 01:05
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表