派博傳思國際中心

標(biāo)題: Titlebook: Cryptology and Network Security; 10th International C Dongdai Lin,Gene Tsudik,Xiaoyun Wang Conference proceedings 2011 Springer-Verlag GmbH [打印本頁]

作者: 連結(jié)    時間: 2025-3-21 16:41
書目名稱Cryptology and Network Security影響因子(影響力)




書目名稱Cryptology and Network Security影響因子(影響力)學(xué)科排名




書目名稱Cryptology and Network Security網(wǎng)絡(luò)公開度




書目名稱Cryptology and Network Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Cryptology and Network Security被引頻次




書目名稱Cryptology and Network Security被引頻次學(xué)科排名




書目名稱Cryptology and Network Security年度引用




書目名稱Cryptology and Network Security年度引用學(xué)科排名




書目名稱Cryptology and Network Security讀者反饋




書目名稱Cryptology and Network Security讀者反饋學(xué)科排名





作者: 細(xì)頸瓶    時間: 2025-3-21 21:10

作者: 糾纏    時間: 2025-3-22 03:28
New Impossible Differential Cryptanalysis of Reduced-Round Camelliaossible differential of Camellia including ./.. layer. Utilizing impossible differential attack, 10-round Camellia-128 is breakable with 2. chosen plaintexts and 2. 10 round encryptions. Moreover, 10-round Camellia-192 and 11-round Camellia-256 can also be analyzed, the time complexity are about 2.
作者: sed-rate    時間: 2025-3-22 05:13

作者: ACE-inhibitor    時間: 2025-3-22 10:12
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48 rounds of PRINTCipher-48 and 9 rounds under some additional assumptions with only 2 known plaintexts faster than brute force. We show that it is possible to break the full 48-round cipher by assuming a moderate leakage of internal state bits or even just Hamming weights of some three-bit states. Su
作者: –FER    時間: 2025-3-22 15:09
EPCBC - A Block Cipher Suitable for Electronic Product Code Encryptionode (EPC) encryption, which uses low-cost passive RFID-tags and exactly 96 bits as a unique identifier on the item level. EPCBC is based on a generalized PRESENT with block size 48 and 96 bits for the main cipher structure and customized key schedule design which provides strong protection against r
作者: –FER    時間: 2025-3-22 20:07
On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structureslayers. For Type 2 GFS, at FSE 2010, Suzaki and Minematsu showed that a better diffusion property can be obtained if one uses some other sub-block-wise permutation. In this paper, we consider Type 1, Source-Heavy (SH), and Target-Heavy (TH) GFSs, and study if their diffusion properties can be improv
作者: aphasia    時間: 2025-3-22 22:01
Security Analysis of an Improved MFE Public Key Cryptosystemng et al gave an improvement of MFE. They claimed that the improved MFE is secure against high order linearization equation attack. However, through theoretical analysis, we find that there are many first order linearization equations(FOLEs) satisfied by this improved version. Using linearization eq
作者: padding    時間: 2025-3-23 03:47

作者: Limited    時間: 2025-3-23 07:29

作者: anticipate    時間: 2025-3-23 12:39

作者: 不透氣    時間: 2025-3-23 14:23
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreementm settings proposed at CANS ’09. While client-to-client password-authenticated key exchange (C2C-PAKE) protocols exist in literature, what is interesting about this one is that it is the only such protocol claimed to offer security against password compromise impersonation without depending on publi
作者: 詞匯表    時間: 2025-3-23 22:02
Passive Attack on RFID LMAP++ Authentication Protocolly logical operator XOR and modular 2. addition. In this paper, a passive attack on LMAP++ protocol is given after constructing the distinguisher for the random numbers used in the protocol. The attack shows the protocol cannot resist passive attack, and after eavesdropping about 480 authentication
作者: 話    時間: 2025-3-24 02:15

作者: 條約    時間: 2025-3-24 04:06

作者: podiatrist    時間: 2025-3-24 08:41

作者: 白楊    時間: 2025-3-24 12:36
AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallaxmes have been proposed and deployed on various websites to secure online services from abuse by automated programs. However, many of these CAPTCHAs have been found to suffer from design flaws that can be exploited to break the CAPTCHA. Hence, the development of a good CAPTCHA scheme that is both sec
作者: 事物的方面    時間: 2025-3-24 16:14
Towards Attribute Revocation in Key-Policy Attribute Based Encryptionon of the user’s identity, which could only revoke the user’s whole attributes by revoking the user’s identity. In some cases, we wish to revoke one attribute of a user instead of the whole attributes issued to him without affecting any other user’s private key, such that the user still can use his
作者: ABYSS    時間: 2025-3-24 21:15

作者: LINE    時間: 2025-3-25 01:05

作者: grieve    時間: 2025-3-25 03:53

作者: 脫落    時間: 2025-3-25 09:03
y Pan and Deng shows that it is not secure. In this paper, we present a new efficient lattice-based public-key cryptosystem mixed with a knapsack, which can resist Pan and Deng’s attack well. What’s more, it has reasonable key size, quick encryption and decryption. However, we have to point out that the new cryptosystem has no security proof.
作者: Canyon    時間: 2025-3-25 12:51
Kriterien zur Schadensbewertung,In this survey, we review a number of the many “expressive” encryption systems that have recently appeared from lattices, and explore the innovative techniques that underpin them.
作者: catagen    時間: 2025-3-25 17:34

作者: 尊嚴(yán)    時間: 2025-3-25 20:11

作者: 食料    時間: 2025-3-26 03:22
Kriterien zur Schadensbewertung,has been employed in many Mifare Classic RFID products, Hitag2 is used by many car manufacturers for unlocking car doors remotely. Until now, except the brute force attack, only one cryptanalysis on this cipher was released by Courtois, O’Neil and Quisquater, which broke Hitag2 by an SAT solver with
作者: Audiometry    時間: 2025-3-26 05:02
Kriterien zur Werkstoffauswahl,ossible differential of Camellia including ./.. layer. Utilizing impossible differential attack, 10-round Camellia-128 is breakable with 2. chosen plaintexts and 2. 10 round encryptions. Moreover, 10-round Camellia-192 and 11-round Camellia-256 can also be analyzed, the time complexity are about 2.
作者: Cabg318    時間: 2025-3-26 12:11
,Thermisch aktivierte Vorg?nge,this paper, we analyze the initialization stage of ZUC v1.5. First of all, we study the differential properties of operations in ZUC v1.5, including the bit-reorganization, exclusive-or and addition modulo 2., bit shift and the update of LFSR. And then we give a differential trail covering 24 rounds
作者: 大漩渦    時間: 2025-3-26 16:08

作者: definition    時間: 2025-3-26 19:36
Atomarer Aufbau kristalliner Stoffe,ode (EPC) encryption, which uses low-cost passive RFID-tags and exactly 96 bits as a unique identifier on the item level. EPCBC is based on a generalized PRESENT with block size 48 and 96 bits for the main cipher structure and customized key schedule design which provides strong protection against r
作者: 極少    時間: 2025-3-27 00:00
layers. For Type 2 GFS, at FSE 2010, Suzaki and Minematsu showed that a better diffusion property can be obtained if one uses some other sub-block-wise permutation. In this paper, we consider Type 1, Source-Heavy (SH), and Target-Heavy (TH) GFSs, and study if their diffusion properties can be improv
作者: 古文字學(xué)    時間: 2025-3-27 03:01
ng et al gave an improvement of MFE. They claimed that the improved MFE is secure against high order linearization equation attack. However, through theoretical analysis, we find that there are many first order linearization equations(FOLEs) satisfied by this improved version. Using linearization eq
作者: prediabetes    時間: 2025-3-27 08:56
y Pan and Deng shows that it is not secure. In this paper, we present a new efficient lattice-based public-key cryptosystem mixed with a knapsack, which can resist Pan and Deng’s attack well. What’s more, it has reasonable key size, quick encryption and decryption. However, we have to point out that
作者: 俗艷    時間: 2025-3-27 11:43

作者: Friction    時間: 2025-3-27 16:26
ration for commercial applications. It became publicly available in 2010 and since then it was neither attacked nor proved to be secure. In this paper, we show that the SM2 key exchange protocol is insecure by presenting realistic attacks in the Canetti-Krawczyk model. The demonstrated attack breaks
作者: 面包屑    時間: 2025-3-27 17:56

作者: obeisance    時間: 2025-3-27 22:12

作者: Gyrate    時間: 2025-3-28 04:40
er prove possession of this certified credential to another party, while minimizing the information given to the latter. At CANS 2010, Guajardo, Mennink and Schoenmakers have introduced the concept of anonymous credential schemes with encrypted attributes, where the attributes to be certified are en
作者: indoctrinate    時間: 2025-3-28 09:54
Henrique Paques,Ling Liu,Calton Puethods require linear amount of work to be performed by unrevoked signers or verifiers, who usually have to obtain fresh update information (sometimes of linear size) published by the group manager. We overcome these disadvantages by proposing a novel group signature scheme, where computation costs
作者: 泥沼    時間: 2025-3-28 10:51

作者: 矛盾心理    時間: 2025-3-28 14:36

作者: THE    時間: 2025-3-28 20:09
Henrique Paques,Ling Liu,Calton Puon of the user’s identity, which could only revoke the user’s whole attributes by revoking the user’s identity. In some cases, we wish to revoke one attribute of a user instead of the whole attributes issued to him without affecting any other user’s private key, such that the user still can use his
作者: AXIOM    時間: 2025-3-29 00:17

作者: 疼死我了    時間: 2025-3-29 06:52
978-3-642-25512-0Springer-Verlag GmbH Berlin Heidelberg 2011
作者: 過剩    時間: 2025-3-29 08:19
Dongdai Lin,Gene Tsudik,Xiaoyun WangState-of-the-art research.Fast-track conference proceedings.Unique visibility
作者: 白楊    時間: 2025-3-29 12:24

作者: ambivalence    時間: 2025-3-29 19:12
Kriterien zur Schadensbewertung,r can be broken within one minute on a PC. The attack is composed of three phases: a black-box attack of extracting 32 bits of the secret key, a white-box attack to get several other key bits, and a brute force search for the remaining key bits.
作者: outset    時間: 2025-3-29 19:56
Atomarer Aufbau kristalliner Stoffe, bounds otherwise. Further, we analyze the resistance of EPCBC against integral cryptanalysis, statistical saturation attack, slide attack, algebraic attack and the latest higher-order differential cryptanalysis from FSE 2011?[11]. Our proposed cipher would be the most efficient at EPC encryption, s
作者: Lineage    時間: 2025-3-30 03:44
this problem: our multi-show anonymous credential scheme with encrypted attributes relies on the non-interactive Groth-Sahai proof system and the recent work on commuting signatures from Fuchsbauer (Eurocrypt 2011) and is proven secure in the standard model.
作者: epinephrine    時間: 2025-3-30 07:32

作者: Optic-Disk    時間: 2025-3-30 11:03
Cube Cryptanalysis of Hitag2 Stream Cipherr can be broken within one minute on a PC. The attack is composed of three phases: a black-box attack of extracting 32 bits of the secret key, a white-box attack to get several other key bits, and a brute force search for the remaining key bits.
作者: 鼓掌    時間: 2025-3-30 13:50
EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption bounds otherwise. Further, we analyze the resistance of EPCBC against integral cryptanalysis, statistical saturation attack, slide attack, algebraic attack and the latest higher-order differential cryptanalysis from FSE 2011?[11]. Our proposed cipher would be the most efficient at EPC encryption, s
作者: 悲痛    時間: 2025-3-30 20:31
Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model this problem: our multi-show anonymous credential scheme with encrypted attributes relies on the non-interactive Groth-Sahai proof system and the recent work on commuting signatures from Fuchsbauer (Eurocrypt 2011) and is proven secure in the standard model.
作者: breadth    時間: 2025-3-30 21:00

作者: 修剪過的樹籬    時間: 2025-3-31 04:14

作者: deciduous    時間: 2025-3-31 05:56

作者: pester    時間: 2025-3-31 11:27
Fast Computation on Encrypted Polynomials and Applicationsefulness by utilizing them to solve two problems from the literature, namely the oblivious polynomial evaluation (OPE) and the private set intersection but expect the techniques to be applicable to other problems as well.
作者: ingestion    時間: 2025-3-31 15:08

作者: 拉開這車床    時間: 2025-3-31 18:42
0302-9743 rnational Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmet
作者: monochromatic    時間: 2025-3-31 21:55

作者: 北極熊    時間: 2025-4-1 05:34

作者: Criteria    時間: 2025-4-1 06:10

作者: 調(diào)整校對    時間: 2025-4-1 10:45

作者: 掃興    時間: 2025-4-1 16:26

作者: Commonplace    時間: 2025-4-1 22:33





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
永康市| 杭锦后旗| 临朐县| 三门县| 嫩江县| 潞西市| 汨罗市| 库伦旗| 鹤山市| 四平市| 兴山县| 油尖旺区| 宜都市| 莆田市| 金塔县| 黑龙江省| 德州市| 那曲县| 霞浦县| 龙陵县| 昆明市| 乌海市| 胶州市| 柘城县| 万安县| 岢岚县| 开远市| 阜阳市| 沙湾县| 四平市| 蒙城县| 河间市| 怀远县| 鄱阳县| 拜泉县| 肇东市| 乌拉特中旗| 海宁市| 馆陶县| 青海省| 噶尔县|