找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security and Privacy; 13th Australasian Co Yi Mu,Willy Susilo,Jennifer Seberry Conference proceedings 2008 Springer-Verlag Berl

[復(fù)制鏈接]
樓主: Spring
31#
發(fā)表于 2025-3-26 21:37:29 | 只看該作者
Fully-Simulatable Oblivious Set Transfer,f the notions of oblivious bit transfer and oblivious string transfer protocols. The security of oblivious set transfer protocols is defined in the real/ideal world simulation paradigm. We show that oblivious set transfer protocols that are provably secure in the full simulation model can be efficie
32#
發(fā)表于 2025-3-27 02:41:09 | 只看該作者
33#
發(fā)表于 2025-3-27 08:34:51 | 只看該作者
34#
發(fā)表于 2025-3-27 11:36:06 | 只看該作者
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers,to construct a family of ciphers in a uniform manner. The family is parameterized by block size, for any size between . and 2.. The design assures that the overall workload for encryption is proportional to the block size. When considering the approach taken in elastic block ciphers, the question ar
35#
發(fā)表于 2025-3-27 15:42:13 | 只看該作者
Multidimensional Linear Cryptanalysis of Reduced Round Serpent,paper we present a new truly multidimensional approach to generalise Matsui’s Algorithm 1. We derive the statistical framework for it and show how to calculate multidimensional probability distributions based on correlations of one-dimensional linear approximations. The main advantage is that the as
36#
發(fā)表于 2025-3-27 19:39:05 | 只看該作者
Cryptanalysis of Reduced-Round SMS4 Block Cipher, SMS4 was not released until January 2006, there have been only a few papers analyzing this cipher. In this paper, firstly we present a kind of 5-round iterative differential characteristic of SMS4 whose probability is about 2.. Then based on this kind of iterative differential characteristic, we pr
37#
發(fā)表于 2025-3-28 00:16:34 | 只看該作者
On the Unprovable Security of 2-Key XCBC,. After Black and Rogaway’s XCBC, Moriai and Imai proposed 2-Key XCBC, which replaced the third key of XCBC with its first key. Moriai and Imai “proved” that 2-Key XCBC is secure if the underling blockcipher is a pseudorandom permutation (PRP). Our research shows that it is not the case. The securit
38#
發(fā)表于 2025-3-28 04:08:22 | 只看該作者
Looking Back at a New Hash Function, process. We explore the computational trade-off between the key schedule and encryption in a block cipher-based hash function and we illustrate our approach with a 256-bit hash function that has a hashing rate equivalent to the encryption rate of AES-128. The design extends naturally to a 512-bit h
39#
發(fā)表于 2025-3-28 06:21:38 | 只看該作者
Non-linear Reduced Round Attacks against SHA-2 Hash Family,ions. Recently, at FSE ’08, an attack against reduced round SHA-256 was presented by Nikoli? and Biryukov which used a local collision which is valid for the actual SHA-256 function. It is a 9-step local collision which starts by introducing a modular difference of 1 in the two messages. It succeeds
40#
發(fā)表于 2025-3-28 12:41:24 | 只看該作者
978-3-540-69971-2Springer-Verlag Berlin Heidelberg 2008
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-2-5 19:37
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
杭锦旗| 和田市| 章丘市| 偏关县| 夏津县| 正安县| 新巴尔虎右旗| 赤壁市| 滨海县| 汪清县| 西丰县| 张家口市| 庆城县| 云南省| 广水市| 宜昌市| 房山区| 新源县| 辽宁省| 江孜县| 额济纳旗| 类乌齐县| 仁化县| 瑞金市| 木里| 岗巴县| 建湖县| 衢州市| 乐东| 措勤县| 黎城县| 富宁县| 南京市| 绥芬河市| 太保市| 嘉鱼县| 罗定市| 务川| 望奎县| 思南县| 荣昌县|