找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security and Privacy; 13th Australasian Co Yi Mu,Willy Susilo,Jennifer Seberry Conference proceedings 2008 Springer-Verlag Berl

[復(fù)制鏈接]
樓主: Spring
31#
發(fā)表于 2025-3-26 21:37:29 | 只看該作者
Fully-Simulatable Oblivious Set Transfer,f the notions of oblivious bit transfer and oblivious string transfer protocols. The security of oblivious set transfer protocols is defined in the real/ideal world simulation paradigm. We show that oblivious set transfer protocols that are provably secure in the full simulation model can be efficie
32#
發(fā)表于 2025-3-27 02:41:09 | 只看該作者
33#
發(fā)表于 2025-3-27 08:34:51 | 只看該作者
34#
發(fā)表于 2025-3-27 11:36:06 | 只看該作者
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers,to construct a family of ciphers in a uniform manner. The family is parameterized by block size, for any size between . and 2.. The design assures that the overall workload for encryption is proportional to the block size. When considering the approach taken in elastic block ciphers, the question ar
35#
發(fā)表于 2025-3-27 15:42:13 | 只看該作者
Multidimensional Linear Cryptanalysis of Reduced Round Serpent,paper we present a new truly multidimensional approach to generalise Matsui’s Algorithm 1. We derive the statistical framework for it and show how to calculate multidimensional probability distributions based on correlations of one-dimensional linear approximations. The main advantage is that the as
36#
發(fā)表于 2025-3-27 19:39:05 | 只看該作者
Cryptanalysis of Reduced-Round SMS4 Block Cipher, SMS4 was not released until January 2006, there have been only a few papers analyzing this cipher. In this paper, firstly we present a kind of 5-round iterative differential characteristic of SMS4 whose probability is about 2.. Then based on this kind of iterative differential characteristic, we pr
37#
發(fā)表于 2025-3-28 00:16:34 | 只看該作者
On the Unprovable Security of 2-Key XCBC,. After Black and Rogaway’s XCBC, Moriai and Imai proposed 2-Key XCBC, which replaced the third key of XCBC with its first key. Moriai and Imai “proved” that 2-Key XCBC is secure if the underling blockcipher is a pseudorandom permutation (PRP). Our research shows that it is not the case. The securit
38#
發(fā)表于 2025-3-28 04:08:22 | 只看該作者
Looking Back at a New Hash Function, process. We explore the computational trade-off between the key schedule and encryption in a block cipher-based hash function and we illustrate our approach with a 256-bit hash function that has a hashing rate equivalent to the encryption rate of AES-128. The design extends naturally to a 512-bit h
39#
發(fā)表于 2025-3-28 06:21:38 | 只看該作者
Non-linear Reduced Round Attacks against SHA-2 Hash Family,ions. Recently, at FSE ’08, an attack against reduced round SHA-256 was presented by Nikoli? and Biryukov which used a local collision which is valid for the actual SHA-256 function. It is a 9-step local collision which starts by introducing a modular difference of 1 in the two messages. It succeeds
40#
發(fā)表于 2025-3-28 12:41:24 | 只看該作者
978-3-540-69971-2Springer-Verlag Berlin Heidelberg 2008
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-2-5 21:15
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
饶平县| 东宁县| 山阳县| 麦盖提县| 温州市| 钦州市| 于都县| 塔城市| 浙江省| 台中县| 阿坝县| 阳山县| 调兵山市| 海林市| 神池县| 休宁县| 博湖县| 邵东县| 建平县| 塔城市| 大化| 金乡县| 方山县| 渭源县| 琼海市| 开远市| 永泰县| 昭觉县| 深州市| 沂源县| 冕宁县| 巴林左旗| 从化市| 泽普县| 瑞金市| 华蓥市| 卢龙县| 阿拉善右旗| 麻阳| 涿鹿县| 尼勒克县|