標(biāo)題: Titlebook: Information Security and Cryptology; 8th International Co Miros?aw Kuty?owski,Moti Yung Conference proceedings 2013 Springer-Verlag Berlin [打印本頁(yè)] 作者: intrinsic 時(shí)間: 2025-3-21 19:46
書目名稱Information Security and Cryptology影響因子(影響力)
書目名稱Information Security and Cryptology影響因子(影響力)學(xué)科排名
書目名稱Information Security and Cryptology網(wǎng)絡(luò)公開度
書目名稱Information Security and Cryptology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security and Cryptology被引頻次
書目名稱Information Security and Cryptology被引頻次學(xué)科排名
書目名稱Information Security and Cryptology年度引用
書目名稱Information Security and Cryptology年度引用學(xué)科排名
書目名稱Information Security and Cryptology讀者反饋
書目名稱Information Security and Cryptology讀者反饋學(xué)科排名
作者: Figate 時(shí)間: 2025-3-22 00:10
On the Multiple Fault Attacks on RSA Signatures with LSBs of Messages Unknown,ze of the unknown part of message. We provide two kinds of techniques to factor the RSA modulus . using the multiple faulty signatures. Comparisons between the previous attacks and the new attacks with a number of LSBs of the message unknown are given on the basis of the simulations.作者: 魅力 時(shí)間: 2025-3-22 03:58 作者: Spangle 時(shí)間: 2025-3-22 07:12 作者: Expiration 時(shí)間: 2025-3-22 10:28
Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN,re the full code book of about 2. known plaintext blocks to succeed over four rounds of DEAN. We give evidence that there is an LLR-based multidimensional linear distinguisher with estimated data complexity 2. over six rounds of DEAN. Turning this to a (partial) key-recovery attack over the full eight-round DEAN is likely to succeed.作者: 辯論 時(shí)間: 2025-3-22 15:30
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to ,,e force using one and two known plaintexts resp. Finally, we are able to identify a class of weak keys for which the attack is faster than brute force for up to 7 rounds of EPCBC-96. Alongside results on EPCBC we believe that the proposed technique of optimized guessing is a useful tool in a more general context of algebraic cryptanalysis.作者: IRS 時(shí)間: 2025-3-22 19:24
Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to AlgebraicWe also check that, at least for small values of the number of variables, the functions of this class have very good nonlinearity, maximum algebraic immunity and almost perfect immunity to fast algebraic attacks.作者: Protein 時(shí)間: 2025-3-23 00:44
0302-9743 ised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.978-3-642-38518-6978-3-642-38519-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: atopic-rhinitis 時(shí)間: 2025-3-23 02:45
0302-9743 dings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. .The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor an作者: 阻撓 時(shí)間: 2025-3-23 05:58
Improved Differential Cache Attacks on SMS4,cache line, only 52 power traces are required. Experimental validation of the complete attack has been done on an Intel Xeon microprocessor. Further we suggest an alteration to the SMS4 algorithm that can counter this attack.作者: alcohol-abuse 時(shí)間: 2025-3-23 12:50
An Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronur protocol is based on the use of publicly verifiable secret sharing. Under the assumptions related to discrete logarithm and ElGamal cryptosystem, computational bounded players have an incentive not to deviate no matter how adversaries behave.作者: superfluous 時(shí)間: 2025-3-23 16:13
Visual Cryptography for Natural Images and Visual Voting,ixel expansion, and thus establishes the visual cryptography scheme suitable for natural images. The second part of this paper presents a visual voting scheme that need no counting process and guarantees anonymity.作者: osteoclasts 時(shí)間: 2025-3-23 19:04
Verifiable Structured Encryption,ability similar to verifiable SSE, but with difference on how a tag for verifiability is defined. This is mainly due to the notions of semi-private data that does not exist in a verifiable SSE scheme. We then present constructions secure under this model and prove security of the constructions.作者: Bravado 時(shí)間: 2025-3-23 22:29
A General Model for MAC Generation Using Direct Injection,uld prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.作者: 字的誤用 時(shí)間: 2025-3-24 02:54
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Ge of 89-bit words memory and 2. keystream bits. This result is better than those in [15,6], which possess the complexity of 2. parity checks and 2. bit operations respectively. Moreover, our attack can be divided and computed in parallel, and the actual runtime of the attack can be reduced depending on the number of computers we access.作者: 褲子 時(shí)間: 2025-3-24 09:52 作者: 他去就結(jié)束 時(shí)間: 2025-3-24 12:20
Collision Attacks on Variant of OCB Mode and Its Series,shows that: 1) OCB-ZXY still cannot resist against collision attacks. 2) OCB2 and OCB3 also suffer from collision attacks, even more severely than OCB1. 3) Even if OCB2 and OCB3 adopt the ODPBT technique, collision attacks still exist.作者: Memorial 時(shí)間: 2025-3-24 16:41 作者: 陳列 時(shí)間: 2025-3-24 21:01
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465369.jpg作者: MEN 時(shí)間: 2025-3-25 02:22 作者: 擔(dān)憂 時(shí)間: 2025-3-25 05:42 作者: 悅耳 時(shí)間: 2025-3-25 07:42
https://doi.org/10.1007/978-3-642-38519-3algebraic cryptanalysis; authentication; linear attacks; security protocols; visual cryptography作者: 空洞 時(shí)間: 2025-3-25 14:38
Fast Evaluation of T-Functions via Time-Memory Trade-Offs,We present two low time-cost methods to evaluate arbitrary T-function on .-bit words; both methods use only fast computer instructions (integer addition and/or bitwise logical instructions) and calls to memory. The methods can be applied in a design of T-function-based stream ciphers for fast encryption software in heavy-traffic networks.作者: 樹木心 時(shí)間: 2025-3-25 17:36 作者: barium-study 時(shí)間: 2025-3-25 21:23 作者: AMOR 時(shí)間: 2025-3-26 03:51 作者: Handedness 時(shí)間: 2025-3-26 06:11 作者: Vaginismus 時(shí)間: 2025-3-26 08:49 作者: 結(jié)構(gòu) 時(shí)間: 2025-3-26 13:00
An Extension of Fault Sensitivity Analysis Based on Clockwise Collision,y of calculations against the fault injections. While the clockwise collision fault sensitivity analysis (CC-FSA) uses the fault injections to detect the occurrence of the clockwise collision and to recover the secret key. Clockwise collision is a phenomenon for iterative hardware circuits, which le作者: 上釉彩 時(shí)間: 2025-3-26 17:00 作者: constitute 時(shí)間: 2025-3-26 21:55 作者: 我不死扛 時(shí)間: 2025-3-27 03:23
Visual Cryptography for Natural Images and Visual Voting,ges printed on transparencies will reveal the secret. The decryption is done directly by the human visual system without any extra calculations. Most of previous researches essentially handle only binary images, as the underling encoding matrices are all Boolean matrices. For gray-level image, we ne作者: 褲子 時(shí)間: 2025-3-27 07:27
RCCA Security for KEM+DEM Style Hybrid Encryptions,ity to the most popular hybrid paradigms, KEM+DEM and Tag-KEM/DEM..It is open to construct an RCCA-secure scheme more efficient than CCA-secure ones. In the setting of Tag-KEM, we solve this by presenting a natural RCCA-secure RSA-based Tag-KEM scheme, named as RSA-TKEM, which is more efficient than作者: 傲慢物 時(shí)間: 2025-3-27 10:39
Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations,ryptosystem as any polynomial equation: . which is satisfied by all such pairs. In this paper, we present a new attack on the multivariate public key cryptosystems from Diophantine equations developed by Gao and Heindl by using the embedded surfaces associated to this family of multivariate cryptosy作者: 推崇 時(shí)間: 2025-3-27 16:22
Verifiable Structured Encryption,stead of keyword-based search only. Both structured encryption and SSE schemes mainly consider security against passive adversaries, until recently where SSE schemes secure against active adversaries were proposed. This means in addition of querying encrypted data, the adversaries can modify encrypt作者: 笨重 時(shí)間: 2025-3-27 17:52
,Nested Merkle’s Puzzles against Sampling Attacks,ties the ability to securely and continuously communicate over an unprotected channel. To achieve the continuous security over unbounded communication sessions we propose to use a . Merkle’s puzzles approach where the honest parties repeatedly establish new keys and use previous keys to encrypt the 作者: AMEND 時(shí)間: 2025-3-27 22:15 作者: 不理會(huì) 時(shí)間: 2025-3-28 05:01 作者: Emmenagogue 時(shí)間: 2025-3-28 10:07 作者: groggy 時(shí)間: 2025-3-28 12:33
,The Security and Performance of “GCM” when Short Multiplications Are Used Instead, performs rather poorly in modern software implementation because of polynomial hashing in the large field GF(2.) (. denotes the block size of the underlying cipher). This paper investigates whether we can use polynomial hashing in the ring GF(2.) X GF(2.) instead. Such a change would normally compr作者: DEMUR 時(shí)間: 2025-3-28 16:32
Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN,lternating block ciphers. The algorithm was previously used by Cho [5] to compute estimates of expected squared correlations and capacities of multidimensional linear approximations of PRESENT. The goal of this paper is to investigate the applicability and usefulness of this algorithm for a nonbinar作者: Relinquish 時(shí)間: 2025-3-28 21:28
Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraichave optimal algebraic degree and good nonlinearity. Further, we prove that the functions of this class have at least sub-maximum algebraic immunity. We also check that, at least for small values of the number of variables, the functions of this class have very good nonlinearity, maximum algebraic i作者: Ptosis 時(shí)間: 2025-3-29 00:30
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Ges. The main idea behind our attack is creating several look-up tables and finally recovering the initial states of .. and .. synchronously, by alternatively deriving the initial states of .. and .. along the chains. We show that our attack is more efficient, and improves the previous attacks on the 作者: depreciate 時(shí)間: 2025-3-29 03:23
curing InfiniBand networks with encryption and packet inspection. Unfortunately, the performance benefits realized via the use of remote direct memory access by InfiniBand are at odds with many kernel-stack-based IP datagram encryption and network monitoring technologies. As a result, it is necessar作者: Fortuitous 時(shí)間: 2025-3-29 11:04 作者: capsaicin 時(shí)間: 2025-3-29 15:29
Sk Subidh Ali,Debdeep Mukhopadhyay tools, such as debuggers and application profilers, do not support tracing through heterogeneous executions that span multiple hosts. In a decentralized system, each host maintains the authoritative record of its own activity in the form of a dependency graph. Reconstructing the provenance of an ob作者: subacute 時(shí)間: 2025-3-29 17:05 作者: HAIL 時(shí)間: 2025-3-29 23:14
Yang Li,Kazuo Ohta,Kazuo Sakiyamactor: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, tra作者: 逢迎春日 時(shí)間: 2025-3-30 03:11 作者: AXIOM 時(shí)間: 2025-3-30 05:45 作者: WAIL 時(shí)間: 2025-3-30 11:32
Teng Guo,Feng Liu,ChuanKun Wu software and hardware mechanisms. The area increased in popularity after the release of the Intel Software Guard Extensions software development kit, enabling industry actors to create applications compatible with the interfaces required to leverage secure enclaves. However, the prime choices of us作者: Control-Group 時(shí)間: 2025-3-30 13:03 作者: Flirtatious 時(shí)間: 2025-3-30 17:46 作者: 嘲笑 時(shí)間: 2025-3-30 21:10 作者: affinity 時(shí)間: 2025-3-31 01:25 作者: 浮雕 時(shí)間: 2025-3-31 07:16 作者: Obituary 時(shí)間: 2025-3-31 12:04
Harry Bartlett,Mufeed AlMashrafi,Leonie Simpson,Ed Dawson,Kenneth Koon-Ho Wong entities can trigger a . resulting in the failure of a much larger set of entities. Recognizing the need for a deeper understanding of the interdependence between such critical infrastructures, in the last few years several interdependency models have been proposed and analyzed. However, most of th作者: 新義 時(shí)間: 2025-3-31 17:11
Zhelei Sun,Peng Wang,Liting Zhangd in the last decades to achieve a better understanding of topologies, correlations and propagation paths in case of perturbations. The discipline is providing interesting insights into aspects such as fragility and robustness of different network layouts against various types of threats, despite th作者: Negotiate 時(shí)間: 2025-3-31 21:20 作者: Heart-Rate 時(shí)間: 2025-3-31 23:01 作者: 去世 時(shí)間: 2025-4-1 04:13 作者: 愛了嗎 時(shí)間: 2025-4-1 08:57
Tianze Wang,Meicheng Liu,Dongdai Lin on the vulnerabilities of the Internet is that the Dutch Government should aim to prevent the occurrence of incidents. The identified vulnerabilities of the Internet, which is a critical infrastructure for the Netherlands, shall be lowered to an acceptable level for the Dutch society. Furthermore, 作者: FLOAT 時(shí)間: 2025-4-1 11:38 作者: dandruff 時(shí)間: 2025-4-1 16:25 作者: 序曲 時(shí)間: 2025-4-1 20:52 作者: KEGEL 時(shí)間: 2025-4-1 23:49
Lidong Han,Wei Wei,Mingjie Liumeworks to existing European Union legislation. A novel, advanced metering system security policy framework that covers all the identified cloud security gaps is specified. The security policy framework is an important first step towards cloud-ready security legislation for advanced metering systems