中图分类
执行
    会议名称
    执行
    中文(共0篇) 外文(共74篇)
    排序:
    导出 保存至文件
    摘要 : Indeed, the current cryptography suffers from the rise of the computing power of computers and the advent of quantum computers could be the death knell of these algorithms. Therefore, with this paper, we present a new encryption a... 展开

    [会议]   Nicolas Bordes   Joan Daemen   Daniel Kuijsters   Gilles Van Assche        Annual International Cryptology Conference        2021年41st届      共 31 页
    摘要 : Designing a block cipher or cryptographic permutation can be approached in many different ways. One such approach, popularized by AES, consists in grouping the bits along the S-box boundaries, e.g., in bytes, and in consistently p... 展开

    [会议]   Nicolas Bordes   Joan Daemen   Danieel Kuijsters   Gilles Van Assche        Annual International Cryptology Conference        2021年41st届      共 31 页
    摘要 : Designing a block cipher or cryptographic permutation can be approached in many different ways. One such approach, popularized by AES, consists in grouping the bits along the S-box boundaries, e.g., in bytes, and in consistently p... 展开

    摘要 : An exact value of round functions collision probability for 3-round Feistel network is derived. The upper bound of algorithm execution complexity for distinguishing Feistel network from a random permutation is given.

    [会议]   Oliynykov, Roman   Gorbenko, Ivan   Dolgov, Victor   Kaidalov, Dmytro               2011年6th届      共 4 页
    摘要 : An exact value of round functions collision probability for 3-round Feistel network is derived. The upper bound of algorithm execution complexity for distinguishing Feistel network from a random permutation is given.

    摘要 : This paper initiates the study of standard-model assumptions on permutations - or more precisely, on families of permutations indexed by a public seed. We introduce and study the notion of a public-seed pseudorandom permutation (p... 展开

    摘要 : This paper initiates the study of standard-model assumptions on permutations - or more precisely, on families of permutations indexed by a public seed. We introduce and study the notion of a public-seed pseudorandom permutation (p... 展开

    [会议]   Mohamed Ahmed Abdelraheem   Gregor Leander   Erik Zenner        International Workshop on Fast Software Encryption        2011年18th届      共 17 页
    摘要 : At CHES 2010, the new block cipher PRINTCIPHER was presented. In addition to using an xor round key as is common practice for round-based block ciphers, PRINTCIPHER also uses key-dependent permutations. While this seems to make di... 展开

    [会议]   Mohamed Ahmed Abdelraheem   Gregor Leander   Erik Zenner        International workshop on fast software encryption;FSE 2011        2011年18th;18th届      共 17 页
    摘要 : At CHES 2010, the new block cipher PRINTcipher was presented. In addition to using an xor round key as is common practice for round-based block ciphers, PRINTcipher also uses key-dependent permutations. While this seems to make di... 展开

    [会议]   Valery Pryamikov        International Conference on Cryptology in India        2006年7th届      共 15 页
    摘要 : In this paper we present a new block cipher over a small finite domain T where ∣T∣ = k is either 2~(16) or 2~(32) . After that we suggest a use of this cipher for enciphering members of arbitrary small finite domains M where M i... 展开

    研究趋势
    相关热图
    学科分类