cryptanalysis相关论文
Feistel-PG structure is a new specific Generalized Feistel structure(GFS) adopted in DBlock and LHash. Its main feature ......
Lattice-based cryptosystems rely on certain lattice problems for their security,such as the shortest vector and the clos......
H2-MAC由Kan Yasuda在ISC 2009上提出,与HMAC的不同之处在于H2-MAC没有外部密钥,简化密钥管理。首次给出 H2-MAC-MD5的等价密钥恢复......
Since Multivatriate Quadratic(MQ)-based Public Key Cryptosystem(MPKC)has been one of the hot research fields of post-qua......
We present two fault injection attacks against the IC-Printing block cipher(PRINTcipher). The basic idea of our attack i......
A key exchange protocol is considered unsafe.The scheme is based on a set of m commuting square singular matrices of dim......
Piveteau signature scheme allows message recovery but the methodology differs from that of the Nyberg-Rueppel schemes. ......
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7......
Hash函数,或者称为密码学Hash函数,是密码学应用的重要组成部分.Hash函数由于其压缩特性,常常被用做消息的核实和认证.近年来,各种......
In 1993, Alabhadi and Wicker gave a modification to Xinmei Digital Signature Scheme based on error-correcting codes, whi......
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in bo......
This paper studies the security of an image encryption scheme based on the Hill cipher (Ismail et al.,2006) and reports ......
In this paper, weights of output set and of input set for finite automata are discussed. For a weakly invertible finite......
The security of Canard-Traore fair e-cash system scheme was believed to depend on the strong-RSA as sumption and the Dec......
Boneh and Durfee have developed a cryptanalytic algorithm on low private key RSA. The algorithm is based on lattice basi......
A substitution box (S-box) plays an important role in cryptographic algorithms.The design of S-box using chaotic systems......

