找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security and Privacy; 13th Australasian Co Yi Mu,Willy Susilo,Jennifer Seberry Conference proceedings 2008 Springer-Verlag Berl

[復(fù)制鏈接]
樓主: Spring
31#
發(fā)表于 2025-3-26 21:37:29 | 只看該作者
Fully-Simulatable Oblivious Set Transfer,f the notions of oblivious bit transfer and oblivious string transfer protocols. The security of oblivious set transfer protocols is defined in the real/ideal world simulation paradigm. We show that oblivious set transfer protocols that are provably secure in the full simulation model can be efficie
32#
發(fā)表于 2025-3-27 02:41:09 | 只看該作者
33#
發(fā)表于 2025-3-27 08:34:51 | 只看該作者
34#
發(fā)表于 2025-3-27 11:36:06 | 只看該作者
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers,to construct a family of ciphers in a uniform manner. The family is parameterized by block size, for any size between . and 2.. The design assures that the overall workload for encryption is proportional to the block size. When considering the approach taken in elastic block ciphers, the question ar
35#
發(fā)表于 2025-3-27 15:42:13 | 只看該作者
Multidimensional Linear Cryptanalysis of Reduced Round Serpent,paper we present a new truly multidimensional approach to generalise Matsui’s Algorithm 1. We derive the statistical framework for it and show how to calculate multidimensional probability distributions based on correlations of one-dimensional linear approximations. The main advantage is that the as
36#
發(fā)表于 2025-3-27 19:39:05 | 只看該作者
Cryptanalysis of Reduced-Round SMS4 Block Cipher, SMS4 was not released until January 2006, there have been only a few papers analyzing this cipher. In this paper, firstly we present a kind of 5-round iterative differential characteristic of SMS4 whose probability is about 2.. Then based on this kind of iterative differential characteristic, we pr
37#
發(fā)表于 2025-3-28 00:16:34 | 只看該作者
On the Unprovable Security of 2-Key XCBC,. After Black and Rogaway’s XCBC, Moriai and Imai proposed 2-Key XCBC, which replaced the third key of XCBC with its first key. Moriai and Imai “proved” that 2-Key XCBC is secure if the underling blockcipher is a pseudorandom permutation (PRP). Our research shows that it is not the case. The securit
38#
發(fā)表于 2025-3-28 04:08:22 | 只看該作者
Looking Back at a New Hash Function, process. We explore the computational trade-off between the key schedule and encryption in a block cipher-based hash function and we illustrate our approach with a 256-bit hash function that has a hashing rate equivalent to the encryption rate of AES-128. The design extends naturally to a 512-bit h
39#
發(fā)表于 2025-3-28 06:21:38 | 只看該作者
Non-linear Reduced Round Attacks against SHA-2 Hash Family,ions. Recently, at FSE ’08, an attack against reduced round SHA-256 was presented by Nikoli? and Biryukov which used a local collision which is valid for the actual SHA-256 function. It is a 9-step local collision which starts by introducing a modular difference of 1 in the two messages. It succeeds
40#
發(fā)表于 2025-3-28 12:41:24 | 只看該作者
978-3-540-69971-2Springer-Verlag Berlin Heidelberg 2008
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-2-5 21:15
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
静宁县| 襄樊市| 兴国县| 鲁山县| 肃北| 清镇市| 绥中县| 区。| 祁东县| 萨迦县| 获嘉县| 东兴市| 邹平县| 本溪市| 广西| 双峰县| 嵊州市| 墨竹工卡县| 敖汉旗| 喜德县| 青岛市| 顺平县| 利川市| 莫力| 娄底市| 普兰县| 武川县| 怀集县| 濮阳县| 扶沟县| 勐海县| 凌源市| 武冈市| 德化县| 灵宝市| 永兴县| 汤阴县| 泗洪县| 衡阳市| 册亨县| 南投市|