標(biāo)題: Titlebook: Codes, Cryptology and Information Security; Second International Said El Hajji,Abderrahmane Nitaj,El Mamoun Souidi Conference proceedings 2 [打印本頁] 作者: 我要黑暗 時(shí)間: 2025-3-21 18:06
書目名稱Codes, Cryptology and Information Security影響因子(影響力)
書目名稱Codes, Cryptology and Information Security影響因子(影響力)學(xué)科排名
書目名稱Codes, Cryptology and Information Security網(wǎng)絡(luò)公開度
書目名稱Codes, Cryptology and Information Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Codes, Cryptology and Information Security被引頻次
書目名稱Codes, Cryptology and Information Security被引頻次學(xué)科排名
書目名稱Codes, Cryptology and Information Security年度引用
書目名稱Codes, Cryptology and Information Security年度引用學(xué)科排名
書目名稱Codes, Cryptology and Information Security讀者反饋
書目名稱Codes, Cryptology and Information Security讀者反饋學(xué)科排名
作者: 季雨 時(shí)間: 2025-3-22 00:15 作者: 外露 時(shí)間: 2025-3-22 00:34 作者: instate 時(shí)間: 2025-3-22 08:37
0302-9743 mation Security, C2SI 2017, held in Rabat, Morocco, in April 2017. .The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 72 submissions. The first aim of this conference is to pay homage to Claude Carlet for his valuable contribution in teaching and作者: 過份 時(shí)間: 2025-3-22 10:12 作者: 分發(fā) 時(shí)間: 2025-3-22 15:28 作者: 分發(fā) 時(shí)間: 2025-3-22 21:07
Kun Li,Huachun Zhou,Zhe Tu,Bohao Fenglso some arguments to show why this problem seems much harder to solve in practice than the Equivalence Punctured Code problem or the Punctured Code problem proposed by . [.]. For one application of this problem we propose an improvement of the three-pass identification scheme of Girault and discuss on its performance.作者: right-atrium 時(shí)間: 2025-3-23 00:54 作者: 預(yù)感 時(shí)間: 2025-3-23 01:37 作者: Medley 時(shí)間: 2025-3-23 08:45
A NP-Complete Problem in Coding Theory with Application to Code Based Cryptographylso some arguments to show why this problem seems much harder to solve in practice than the Equivalence Punctured Code problem or the Punctured Code problem proposed by . [.]. For one application of this problem we propose an improvement of the three-pass identification scheme of Girault and discuss on its performance.作者: outskirts 時(shí)間: 2025-3-23 12:06 作者: overbearing 時(shí)間: 2025-3-23 15:55
https://doi.org/10.1007/978-981-15-9129-7 complexity is quasi linear in the size of the table of values of the S-box whereas it is quadratic with statistical attacks. It is shown that it can be easily extended to a so-called multidimensional attack. The attack is experimented on a AES S-box.作者: Halfhearted 時(shí)間: 2025-3-23 20:16
Yifang Zhi,Li Yang,Gaolei Yang,Yuehong Zhangrithm, to resist a reaction attack first proposed by Bernstein et al..The implementation is done in C on Intel core i3 CPU and 4?GB RAM and 64 bit OS. The code is running Debian/Linux 3.5.2, where the source has been compiled with gcc 4.7.作者: 丑惡 時(shí)間: 2025-3-23 23:04 作者: accrete 時(shí)間: 2025-3-24 04:26 作者: TEN 時(shí)間: 2025-3-24 06:42
Yifang Zhi,Li Yang,Gaolei Yang,Yuehong Zhangt distribution for all the elements of an extended family of reducible cyclic codes that fully covers one of the open cases suggested in [.]. In addition, as will be seen further on, through our results we obtain an alternative description for one of the families of cross-correlation functions studied in [.].作者: faculty 時(shí)間: 2025-3-24 12:00 作者: Retrieval 時(shí)間: 2025-3-24 18:12
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiabilitych that any third party can verify the correctness of the computations without having access to the original data. This makes this work an important contribution to cloud computing and applications where operations on sensitive data have to be performed, such as statistics on medical records and tallying of electronically cast votes.作者: 間諜活動 時(shí)間: 2025-3-24 21:30 作者: 寬敞 時(shí)間: 2025-3-25 01:21
Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challengesimplementations and their limitations, and the management of the huge complexity caused by homomorphic calculation. These issues are analyzed with the help of recent related work published in the literature, and with the experience gained by the authors through their experiments.作者: Infusion 時(shí)間: 2025-3-25 04:12 作者: Flat-Feet 時(shí)間: 2025-3-25 09:29
Efficient Implementation of Hybrid Encryption from Coding Theoryrithm, to resist a reaction attack first proposed by Bernstein et al..The implementation is done in C on Intel core i3 CPU and 4?GB RAM and 64 bit OS. The code is running Debian/Linux 3.5.2, where the source has been compiled with gcc 4.7.作者: Feigned 時(shí)間: 2025-3-25 15:40
Conference proceedings 2017nd cryptography worldwide, especially in Africa. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security..作者: Focus-Words 時(shí)間: 2025-3-25 18:15 作者: 背帶 時(shí)間: 2025-3-25 20:08 作者: 用不完 時(shí)間: 2025-3-26 00:38 作者: 共和國 時(shí)間: 2025-3-26 05:11 作者: wall-stress 時(shí)間: 2025-3-26 09:19 作者: Incommensurate 時(shí)間: 2025-3-26 16:34
A Median Nearest Neighbors LDA for Anomaly Network Detectionian of every data class. The further samples will be essential for preserving the global structure of every class. Extensive experiments on two well known datasets namely KDDcup99 and NSL-KDD show that the proposed approach can achieve a promising attack identification accuracy.作者: neutralize 時(shí)間: 2025-3-26 19:19
Revisiting the Efficient Key Generation of ZHFE number of variables and . is a linear algebra constant. We also estimate the number of possible keys generated by all existing private key generation algorithms for ZHFE. Our algorithm generates as many private ZHFE keys as the original and Baena et al.’s ones. This makes our algorithm be the best appropriate for the ZHFE scheme.作者: 的是兄弟 時(shí)間: 2025-3-26 21:18 作者: 煩躁的女人 時(shí)間: 2025-3-27 02:04 作者: convert 時(shí)間: 2025-3-27 06:41
Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challengeshemes and the problems to be tackled in order to progress toward their adoption. For that purpose, the article provides, at first, a brief introduction regarding (S/F)HE. Then, it focuses on some practical issues related to the adoption of (S/F)HE schemes, i.e. the security parameters, the existing 作者: tympanometry 時(shí)間: 2025-3-27 10:20 作者: Heart-Rate 時(shí)間: 2025-3-27 15:46
Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Fielderived from the Information-Set Decoding (ISD) algorithm. The ISD algorithm was proposed in 1962 by . and improved in 1989 by . and later in 1991 by .. Since then, there have been numerous works improving and generalizing the ISD algorithm: . in 2009, . and . in 2011, . and . in 2012, . and . in 20作者: NOVA 時(shí)間: 2025-3-27 21:03
Parameters of 2-Designs from Some BCH Codestruction of .-designs from codes has been made so far. It was also proven that the automorphism groups of the extended codes of the narrow-sense primitive BCH codes over finite fields are doubly transitive and these extended codes hold 2-designs. But little is known about the parameters of these 2-d作者: 承認(rèn) 時(shí)間: 2025-3-28 01:48
A Median Nearest Neighbors LDA for Anomaly Network DetectionThe first one requires that the global data structure and the local data structure must be coherent. The second concerns data classes distribution nature. It should be a Gaussian distribution. Nevertheless, in pattern recognition problems, especially network anomalies detection, these conditions are作者: 群島 時(shí)間: 2025-3-28 04:11
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability. It improves the initial proposal by avoiding false negatives during the verification algorithm. This work provides a detailed description of ., a comparison with the original scheme, a security and correctness proof, and a performance analysis showing that all algorithms run in reasonable time for作者: aviator 時(shí)間: 2025-3-28 06:50 作者: 替代品 時(shí)間: 2025-3-28 13:49 作者: 浪蕩子 時(shí)間: 2025-3-28 15:52
The Weight Distribution for an Extended Family of Reducible Cyclic Codesr contribution improves the sufficient numerical conditions that determine the weight distribution for the class of reducible cyclic codes that were studied in [.] and in [.]. Furthermore, as will be shown later, a conclusion here will be that thanks to these previous works and the present contribut作者: 帶來的感覺 時(shí)間: 2025-3-28 19:17 作者: ARM 時(shí)間: 2025-3-29 01:34
Spectral Approach for Correlation Power Analysisconsumption measures on a device running a cryptographic algorithm with a CMOS technology based circuitry. Unlike most of CPA attacks that are based on statistical attacks, this paper proposes a new approach based on spectral analysis. The interest lies in the reduction of the attack complexity. The作者: 脫落 時(shí)間: 2025-3-29 06:53
Efficient Implementation of Hybrid Encryption from Coding Theoryeve IND-CCA2 security (in the random oracle model), we use an HMAC function of the message and the symmetric key, and then apply AES128-CBC as the data encapsulation part of this hybrid scheme. The HMAC function is based on SHA3-512. In addition, we introduce a modification in the decapsulation algo作者: 過多 時(shí)間: 2025-3-29 10:42 作者: 兵團(tuán) 時(shí)間: 2025-3-29 15:25
978-3-319-55588-1Springer International Publishing AG 2017作者: 暫時(shí)休息 時(shí)間: 2025-3-29 16:38
Said El Hajji,Abderrahmane Nitaj,El Mamoun SouidiIncludes supplementary material: 作者: 來這真柔軟 時(shí)間: 2025-3-29 23:17
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/228847.jpg作者: Defraud 時(shí)間: 2025-3-30 03:01
Md Shahab Uddin,Mohammad Mannan,Amr YoussefIn this paper, we determine the Walsh spectra of three classes of quadratic APN functions and we prove that the class of quadratic trinomial APN functions constructed by G?lo?lu is affine equivalent to Gold functions.作者: 注射器 時(shí)間: 2025-3-30 04:20 作者: 推測 時(shí)間: 2025-3-30 09:02
Some Results on the Known Classes of Quadratic APN FunctionsIn this paper, we determine the Walsh spectra of three classes of quadratic APN functions and we prove that the class of quadratic trinomial APN functions constructed by G?lo?lu is affine equivalent to Gold functions.作者: 存在主義 時(shí)間: 2025-3-30 13:42 作者: upstart 時(shí)間: 2025-3-30 19:09 作者: 休閑 時(shí)間: 2025-3-30 21:04 作者: antidote 時(shí)間: 2025-3-31 03:17 作者: Iniquitous 時(shí)間: 2025-3-31 08:22
Pejman Najafi,Feng Cheng,Christoph Meinelfield. In fact, we introduce new constructions of functions over elliptic curves which take in input two random points from two different subgroups. In other words, for a given elliptic curve . defined over a finite field . and two random points . and ., where . and . are two subgroups of ., our fun