搜索结果: 1-7 共查到“军事学 Condition”相关记录7条 . 查询时间(0.113 秒)
Condition on composite numbers easily factored with elliptic curve method
factoring number theory RSA
2017/5/12
For a composite integer NN that we would like to factor, we consider a condition for the elliptic curve method using NN as a scalar value to succeed and show that if NN has a prime factor pp such that...
An Equivalent Condition on the Switching Construction of Differentially 4-uniform Permutations on $\gf_{2^{2k}}$ from the Inverse Function
Differentially 4-uniform function Substitution box 4-Uniform BFI
2016/1/7
Differentially 4-uniform permutations on \gf22k with high nonlinearity are often chosen as Substitution boxes in block ciphers. Recently, Qu et al. used the powerful switching method to construct such...
Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack under an Isogeny Condition
Weil descent attack GHS attack
2014/3/11
The GHS attack is known as a method to map the discrete logarithm problem(DLP) in the Jacobian of a curve C_{0} defined over the d degree extension k_{d} of a finite field k to the DLP in the Jacobian...
Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack without Isogeny Condition
Weil descent attack GHS attack Elliptic curve cryptosystems
2009/12/29
The GHS attack is known as a method to map the discrete loga-
rithm problem(DLP) in the Jacobian of a curve C0 defined over the d
degree extension kd of a finite field k to the DLP in the Jacobian o...
A Sufficient Condition for Secure Ping--Pong Protocols
Sufficient Condition Secure Ping--Pong Protocols
2009/4/16
A Sufficient Condition for Secure Ping--Pong Protocols.
The notion of key privacy for encryption schemes was defined formally by Bellare, Boldyreva,
Desai and Pointcheval in Asiacrypt 2001. This notion seems useful in settings where anonymity
is importan...
How to Construct Sufficient Condition in Searching Collisions of MD
Construct Sufficient Condition Searching Collisions MD
2008/10/31
In Eurocrypt 2005, Wang et al. presented a collision attak on MD5. In their paper, they intoduced “Sufficient Condition” which would be needed to generate collisions. In this paper, we explain how to ...