搜索结果: 1-12 共查到“军队指挥学 Improved Cryptanalysis”相关记录12条 . 查询时间(0.065 秒)
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem
public-key cryptography KMOV
2019/9/19
This paper presents two new improved attacks on the KMOV cryptosystem. KMOV is an encryption algorithm based on elliptic curves over the ring ZNZN where N=pqN=pq is a product of two large primes of eq...
Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem
public-key cryptography Mersenne numbers LLL
2019/6/3
At Crypto 2018, Aggarwal, Joux, Prakash and Santha (AJPS) described a new public-key encryption scheme based on Mersenne numbers. Shortly after the publication of the cryptosystem, Beunardeau et al. d...
The HFEv- signature scheme is one of the most studied multivariate schemes and one of the major candidates for the upcoming standardization of post-quantum digital signature schemes. In this paper, we...
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version)
hash function GOST Whirlpool
2016/1/9
The GOST hash function family has served as the new Russian national hash
standard (GOST R 34.11-2012) since January 1, 2013, and it has two members, i.e., GOST-
256 and GOST-512 which correspond to...
AES-based functions have attracted of a lot of analysis in the recent years, mainly
due to the SHA-3 hash function competition. In particular, the rebound attack allowed to
break several proposals a...
Improved Cryptanalysis of Reduced RIPEMD-160
semi-free-start collision compression function
2014/3/7
In this article, we propose an improved cryptanalysis of the double-branch hash function standard RIPEMD-160. Using a carefully designed non-linear path search tool, we study the potential differentia...
The hash function Skein is the submission of Ferguson et
al. to the NIST Hash Competition, and is arguably a serious candidate
for selection as SHA-3. This paper presents the first third-party analy...
The hash function Skein is the submission of Ferguson et
al. to the NIST Hash Competition, and is arguably a serious candidate
for selection as SHA-3. This paper presents the first third-party analy...
We state the design flaws of the 1-round block cipher SHAMATA-
BC, designed by Fleishmann and Gorski by using the building
blocks of SHAMATA hash function. We fix the flaws and then show that
the a...
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths
MD4 Differential Path APOP NMAC
2009/6/2
In case of security analysis of hash functions, finding a good
collision-inducing differential paths has been only focused on. However,
it is not clear how differential paths of a hash function infl...
SecurID is a widely used hardware token for strengthening authentica-
tion in a corporate environment. Recently, Biryukov, Lano, and Preneel
presented an attack on the alleged SecurID hash function ...
We improve on the best known cryptanalysis of the stream cipher
Py by using a hidden Markov model for the carry bits in addition operations
where a certain distinguishing event takes place, and cons...