標(biāo)題: Titlebook: Information Security and Privacy; 16th Australisian Co Udaya Parampalli,Philip Hawkes Conference proceedings 2011 Springer-Verlag GmbH Berl [打印本頁(yè)] 作者: Flange 時(shí)間: 2025-3-21 18:38
書(shū)目名稱Information Security and Privacy影響因子(影響力)
書(shū)目名稱Information Security and Privacy影響因子(影響力)學(xué)科排名
書(shū)目名稱Information Security and Privacy網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Information Security and Privacy網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Information Security and Privacy被引頻次
書(shū)目名稱Information Security and Privacy被引頻次學(xué)科排名
書(shū)目名稱Information Security and Privacy年度引用
書(shū)目名稱Information Security and Privacy年度引用學(xué)科排名
書(shū)目名稱Information Security and Privacy讀者反饋
書(shū)目名稱Information Security and Privacy讀者反饋學(xué)科排名
作者: 煞費(fèi)苦心 時(shí)間: 2025-3-21 21:34 作者: Addictive 時(shí)間: 2025-3-22 04:02
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacksbabilistic algebraic attacks. We analyze both lower and upper bounds on algebraic immunity distance, and also present the relations among algebraic immunity distance, .-error algebraic immunity, algebraic immunity and high order nonlinearity.作者: prediabetes 時(shí)間: 2025-3-22 07:38
Improving the Algorithm 2 in Multidimensional Linear Cryptanalysiscks are the best known key recovery attacks on 11-round and 12-round .. The data, time, and memory complexity of the previously best known attack on 12-round . are reduced by factor of 2., 2., and 2., respectively. This paper also simulates the experiments of the improved Algorithm 2 in multidimensional linear cryptanalysis on 5-round ..作者: RAG 時(shí)間: 2025-3-22 08:46
Cryptanalysis of the Compression Function of SIMDthe 24-step compression function with complexity 2.. Furthermore, we give a distinguisher attack for the full compression function of SIMD-512 with complexity 2.. Our attacks are also applicable for the final compression function of SIMD.作者: Daily-Value 時(shí)間: 2025-3-22 13:20
0302-9743 ons on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.978-3-642-22496-6978-3-642-22497-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: BAIT 時(shí)間: 2025-3-22 19:08
Conference proceedings 2011 Australia, in July 2011. The 24 revised full papers presentedtogether with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access contr作者: 拱形面包 時(shí)間: 2025-3-23 00:02 作者: creditor 時(shí)間: 2025-3-23 03:46 作者: CRANK 時(shí)間: 2025-3-23 06:43
Double SP-Functions: Enhanced Generalized Feistel Networksy active S-boxes by up to 33% and 50% higher than that with single SP-functions for type-I and type-II GFNs, respectively. This opens up the possibility of designing more efficient block ciphers based on GFN structure. Note that type-I and type-II GFNs are the only non-contracting GFNs with 4 lines under a reasonable definition of a GFN.作者: THROB 時(shí)間: 2025-3-23 10:18
Faster and Smoother – VSH Revisited this would have a?devastating effect on the original versions. This observation leads us to propose a?variant that operates modulo a power of two to increase the speed even more. A function that offers an equivalent of 128-bit collision resistance runs at 68.5 MB/s on a 2.4 GHz Intel Core 2 CPU, more than a third of the speed of SHA-256.作者: debase 時(shí)間: 2025-3-23 17:17
Application-Binding Protocol in the User Centric Smart Card Ownership Model a security framework that provides runtime authentication, and verification of an application. Such a framework is the focus of this paper. To support the framework, we propose a protocol that is verified using CasperFDR. In addition, we implemented the protocol and provide a performance comparison with existing protocols.作者: Limousine 時(shí)間: 2025-3-23 20:57 作者: 率直 時(shí)間: 2025-3-24 01:17 作者: Biofeedback 時(shí)間: 2025-3-24 02:24 作者: GRATE 時(shí)間: 2025-3-24 06:39 作者: Androgen 時(shí)間: 2025-3-24 11:51 作者: 恃強(qiáng)凌弱的人 時(shí)間: 2025-3-24 16:14 作者: craven 時(shí)間: 2025-3-24 19:42
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465405.jpg作者: 存在主義 時(shí)間: 2025-3-24 23:10
https://doi.org/10.1007/978-3-642-22497-3anonymity; cryptanalysis; data encryption; e-commerce; network security作者: disparage 時(shí)間: 2025-3-25 03:23
State Convergence in the Initialisation of Stream Ciphersr generates a different keystream. In this paper, we analyse two ciphers, A5/1 and Mixer, for which this does not happen due to state convergence. We show how the state convergence problem occurs and estimate the effective key-space in each case.作者: alcohol-abuse 時(shí)間: 2025-3-25 10:07
Conference proceedings 2011 Australia, in July 2011. The 24 revised full papers presentedtogether with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.作者: 山頂可休息 時(shí)間: 2025-3-25 12:04
On Known and New Differentially Uniform Functionse search for more of such functions is necessary. We propose a way of designing functions which can possibly be APN or differentially 4-uniform and be bijective. We illustrate it with an example of a differentially 4-uniform (.,.)-permutation for . odd, based on the power function .. over the second作者: 水獺 時(shí)間: 2025-3-25 19:31 作者: 拖債 時(shí)間: 2025-3-25 21:12
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attackslters in a linear feedback shift register based nonlinear filter generator, such that probabilistic algebraic attacks outperform deterministic ones. Then we introduce two notions, algebraic immunity distance and .-error algebraic immunity, to measure the ability of Boolean functions resistant to pro作者: Badger 時(shí)間: 2025-3-26 00:29
Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Repres maximum algebraic immunity (MAI Boolean functions) by using univariate polynomial representation of Boolean functions over finite fields have received more and more attention. In this paper, how to obtain more MAI Boolean functions from a known MAI Boolean function under univariate polynomial repre作者: 辭職 時(shí)間: 2025-3-26 06:56
Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis last round key with . plaintext-ciphertext pairs, then its time complexity is .. In this paper, we show that by applying the . and . to the Algorithm 2 of multidimensional linear cryptanalysis, we can reduce the time complexity of the attack to ., where . is 3(.?+?.) or 4.?+?3. . The resulting atta作者: notice 時(shí)間: 2025-3-26 08:46 作者: 盡責(zé) 時(shí)間: 2025-3-26 13:23 作者: 平淡而無(wú)味 時(shí)間: 2025-3-26 17:42 作者: Delectable 時(shí)間: 2025-3-27 00:38
Algebraic Techniques in Differential Cryptanalysis Revisited namely Attack?A, Attack?B and Attack?C. For Attack?A, they explain that the time complexity is difficult to determine. The goal of Attacks?B and?C is to filter out wrong pairs and then recover the key. In this paper, we show that Attack?C does not provide an advantage over differential cryptanalysi作者: 拍翅 時(shí)間: 2025-3-27 03:54 作者: placebo 時(shí)間: 2025-3-27 08:01 作者: Mutter 時(shí)間: 2025-3-27 12:53
Electronic Cash with Anonymous User Suspension coins. However, it is not possible to prevent users from misbehaving under some other subjective definitions of misbehavior, such as money laundering. One solution is to incorporate a trusted third party (TTP), which, upon complaint, uses its power to deanonymize the suspected user. This solution, 作者: 向下五度才偏 時(shí)間: 2025-3-27 14:34
-Robust Scalable Group Key Exchange Protocol with ,(log,) Complexity-robust scalable GKE with communicational and computational complexity .(log.) for the size of . parties. As a result, our GKE not only has a resistance to party failures resulting from party crashes, run-down batteries, and network failures, but also satisfies scalability: each party does not need 作者: 反感 時(shí)間: 2025-3-27 21:45 作者: FACT 時(shí)間: 2025-3-27 22:15 作者: 值得 時(shí)間: 2025-3-28 05:46
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theoremhsbauer . introduced two equilibrium notions (computational version of strict Nash equilibrium and stability with respect to trembles) offering a computational relaxation of traditional game theory equilibria. Using trapdoor permutations, they constructed a rational .-out-of . sharing technique sati作者: beta-carotene 時(shí)間: 2025-3-28 09:52 作者: 禮節(jié) 時(shí)間: 2025-3-28 10:47 作者: eczema 時(shí)間: 2025-3-28 18:08
in facsimile the collection of Lampung manuscripts brought back by the former Governor General Sloet van de Beele (143). This edition still remains the principal source for the Lampung script. Van der Tuuk only obtained a better acquaintance with this language during his two years’ stay in the area.作者: 變化無(wú)常 時(shí)間: 2025-3-28 21:02 作者: 阻礙 時(shí)間: 2025-3-29 01:59
Jiazhe Chen,Keting Jia,Hongbo Yu,Xiaoyun Wangthus far appeared dealing with the above-mentioned three cultures. Anthropology here is used in its widest sense: Physical anthropology, ethnology, cultural anthropology, archaeology and ethno- history. l In view of the fact that Kennedy‘s bibliography has recently been brought up to date,2 a few wo作者: commodity 時(shí)間: 2025-3-29 06:22 作者: Banister 時(shí)間: 2025-3-29 09:57
Yusong Du,Fangguo Zhangof intervention itself. Who should be involved, why and how and in whose interests? The main challenge is that no so-called community is homogeneous and so we always have to consider the complexity of the community in which we are working. The mental maps vary by age, gender, language, level of inco作者: Diverticulitis 時(shí)間: 2025-3-29 13:18
Phuong Ha Nguyen,Hongjun Wu,Huaxiong Wangof intervention itself. Who should be involved, why and how and in whose interests? The main challenge is that no so-called community is homogeneous and so we always have to consider the complexity of the community in which we are working. The mental maps vary by age, gender, language, level of inco作者: 起皺紋 時(shí)間: 2025-3-29 16:06
Sui-Guan Teo,Ali Al-Hamdan,Harry Bartlett,Leonie Simpson,Kenneth Koon-Ho Wong,Ed Dawsonl world and develops an ethic of responsibility that focuses on the notion of self-critical choice-making. The argument is that all too often proponents of (theoretical) approaches do not problematize as an issue of concern their predisposition to think-and-act along a certain route—which excludes o作者: EXTOL 時(shí)間: 2025-3-29 23:27 作者: ALLEY 時(shí)間: 2025-3-30 00:25 作者: 使人入神 時(shí)間: 2025-3-30 06:08
Meiqin Wang,Yue Sun,Nicky Mouha,Bart Preneelcience and technology. And yet this seems to have been achieved only at a monumental cost in terms of new forms of sociopathologies. In relative terms, at the level of “design,” modernity’s progress has been emphatic, but at the level of “debate” and “disimprisonment,” our progress has been pathetic作者: 碎片 時(shí)間: 2025-3-30 08:39
Juraj ?arinayvior against the specified properties. It is well-known that the third process often encounters the problem of state explosion. To achieve fully automated formal validation, researchers usually abstract away details of operating procedures and concentrate on route interlocking that prevents train co作者: Peristalsis 時(shí)間: 2025-3-30 13:49 作者: CHOKE 時(shí)間: 2025-3-30 18:15
Man Ho Au,Willy Susilo,Yi Mu allows us to easily build models of interactive systems and prove (in the mathematical sense) that those models can never violate safety requirements, all in a single formal language. TLA models can also be ., that is, extended by adding details in a carefully prescribed way, such that the addition作者: Wordlist 時(shí)間: 2025-3-30 21:59 作者: 非實(shí)體 時(shí)間: 2025-3-31 04:16
Raja Naeem Akram,Konstantinos Markantonakis,Keith Mayes allows us to easily build models of interactive systems and prove (in the mathematical sense) that those models can never violate safety requirements, all in a single formal language. TLA models can also be ., that is, extended by adding details in a carefully prescribed way, such that the addition作者: 誘騙 時(shí)間: 2025-3-31 08:31 作者: 神圣將軍 時(shí)間: 2025-3-31 10:44
Mingwu Zhang,Tsuyoshi Takagifications are satisfied. Although previous works have addressed the problem of synthesising controllers under uncertainty constraints and temporal logic specifications, reaction to dynamic environments has not been considered under this scenario. The method uses feedback-based information roadmaps (作者: 喚起 時(shí)間: 2025-3-31 16:38
Yun Zhang,Christophe Tartary,Huaxiong Wangogic formulae. Most of the existing solutions use the notion of abstraction to obtain a discrete transition system that simulates the dynamics of the robot. Nevertheless, these solutions have poor scalability with the dimension of the configuration space of the robots. For problems with a single rob作者: Microgram 時(shí)間: 2025-3-31 18:48
Shashank Lagishetty,Pruthvi Sabbu,Kannan Srinathanfications are satisfied. Although previous works have addressed the problem of synthesising controllers under uncertainty constraints and temporal logic specifications, reaction to dynamic environments has not been considered under this scenario. The method uses feedback-based information roadmaps (