军事学 >>> 军事学
搜索结果: 1-5 共查到军事学 isomorphisms相关记录5条 . 查询时间(0.078 秒)
In [eprint.iacr.org/2012/663] method of virtual isomorphisms of ciphers was applied for differential/linear cryptanalysis of AES. It was shown that AES seems to be weak against those attacks. That res...
Ciphers y = C(x, k) and  = (, ) are isomorphic if there exists invertible computable in both directions map y « , x « , k « ....
At EUROCRYPT '96 J. Patarin introduced the Isomorphisms of Polynomials (IP) problem as a basis of authentication and signature schemes [4, 5]. We describe an attack on the secret key of IP with one...
In this paper we examine the hard problems underlying asymmetric pairings, their precise relationships and how they affect a number of existing protocols. Furthermore, we present a new model for the...
General method of side-channel attacks protection, based on random cipher isomorphisms is presented. Isomorphic ciphers produce common outputs for common inputs. Cipher isomorphisms can be changed i...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...