军事学 >>> 军事学 >>> 军队指挥学 >>> 密码学 >>>
搜索结果: 1-8 共查到密码学 birthday attack相关记录8条 . 查询时间(0.228 秒)
Birthday Attack on Dual EWCDM     secret-key cryptography  EWCDM       font style='font-size:12px;'> 2017/6/22
In CRYPTO 2017, Mennink and Neves showed almost n-bit security for a dual version of EWCDM. In this paper we describe a birthday attack on this construction which violates their claim.
In this paper, to match a lightweight digital signing scheme of which the length of modulus is between 80 and 160 bits, a lightweight hash function called JUNA is proposed. It is based on the intracta...
Improved Generalized Birthday Attack     Generalized Birthday Attack  Linearization  Information-Set Decoding       font style='font-size:12px;'> 2011/7/25
Let r, B and w be positive integers. Let C be a linear code of length Bw and subspace of Fr .
Let r, B and w be positive integers. Let C be a linear code of length Bw and subspace of Fr . The k-regular-decoding problem is to find 2 a nonzero codeword consisting of w length-B blocks with Hammin...
The hash function FSB is one of the candidates submitted to NIST’s competition to find the new standard hash function, SHA-3. The compression function of FSB is based on error correcting codes. In ...
How to Launch A Birthday Attack Against DES     DES  Differential cryptanalysis  Linear cryptanalysis       font style='font-size:12px;'> 2009/6/5
We present a birthday attack against DES. It is entirely based on the relationship Li+1 = Ri and the simple key schedule in DES. It requires about 216 ciphertexts of the same R16, encrypted by the s...
Bounds on Birthday Attack Times     Birthday attack  hash function       font style='font-size:12px;'> 2009/3/4
We analyze a generic birthday attack where distinct inputs to some function f are selected until two of the inputs map through f to the same output, meaning that the attack has succeeded. We give ti...
Kim et al. [4] and Contini et al. [3] studied on the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Especially, they considered the distinguishing attacks. However, they did n...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...