cryptanalysis相关论文
...
Achterbahn-128 is a stream cipher proposed by Gammel et al.and submitted to the eSTREAM project.Though many attacks have......
Asymmetric cryptographic schemes represented by RSA have been shown to be insecure under the condition of quantum comput......
ElGamal cryptography is one of the most important Public Key Cryptography(PKC)since Diffie-hellman exchangs was proposed......
In this paper, we try to give a security evaluation of LIZARD stream cipher in regard to fault attacks, which, to the be......
It is proved that the digital signaturescheme with one-time pair of keys proposed by X. Yi etal. In Electronics Letters ......
The quantum secure direct communication(QSDC)protocol with a random basis and order is analysed and an effective attack,......
It is generally believed that nonorthogonal operations which can realize the state transformation between two nonorthogo......
...
,Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a
...
A CHARACTERISTIC SET METHOD FOR SOLVING BOOLEAN EQUATIONS AND APPLICATIONS IN CRYPTANALYSIS OF STREA
This paper presents a characteristic set method for solving Boolean equations, which is more efficient and has better pr......
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生......
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生......
A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. ......
Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault ana......
The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been ......
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness o......
A cryptosystem with non-commu-tative platform groups based on conjugator search problem was recently introduced at Neura......
Achterbahn is one of the candidate stream ciphers submitted to the eSTREAM, which is the ECRYPT StreamCipher Project. Th......
Feistel-PG structure is a new specific Generalized Feistel structure(GFS) adopted in DBlock and LHash. Its main feature ......
Lattice-based cryptosystems rely on certain lattice problems for their security,such as the shortest vector and the clos......
H2-MAC由Kan Yasuda在ISC 2009上提出,与HMAC的不同之处在于H2-MAC没有外部密钥,简化密钥管理。首次给出 H2-MAC-MD5的等价密钥恢复......
Since Multivatriate Quadratic(MQ)-based Public Key Cryptosystem(MPKC)has been one of the hot research fields of post-qua......
We present two fault injection attacks against the IC-Printing block cipher(PRINTcipher). The basic idea of our attack i......
A key exchange protocol is considered unsafe.The scheme is based on a set of m commuting square singular matrices of dim......
Piveteau signature scheme allows message recovery but the methodology differs from that of the Nyberg-Rueppel schemes. ......
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7......
Recently,Hwang et al.proposed a(t,n)threshold-proxy(c,m)threshold signature schemes,in which only any t or more original......
Hash函数,或者称为密码学Hash函数,是密码学应用的重要组成部分.Hash函数由于其压缩特性,常常被用做消息的核实和认证.近年来,各种......
In 1993, Alabhadi and Wicker gave a modification to Xinmei Digital Signature Scheme based on error-correcting codes, whi......
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in bo......
...
This paper studies the security of an image encryption scheme based on the Hill cipher (Ismail et al.,2006) and reports ......
In this paper, weights of output set and of input set for finite automata are discussed. For a weakly invertible finite......
The security of Canard-Traore fair e-cash system scheme was believed to depend on the strong-RSA as sumption and the Dec......
Boneh and Durfee have developed a cryptanalytic algorithm on low private key RSA. The algorithm is based on lattice basi......
A substitution box (S-box) plays an important role in cryptographic algorithms.The design of S-box using chaotic systems......
CLEFIA,a new 128-bit block cipher proposed by Sony Corporation,is increasingly attracting cryptanalysts’ attention.In t......
Decorrelated Fast Cipher(DFC) is a candidate for the Advanced Encryption Standard (AES). It is shown that the cryptograp......
针对基于随机背包公钥密码方案,根据方案不同参数分别给出了恢复私钥攻击和恢复密文中明文的格攻击,并通过计算实例验证格攻击有效......
针对Park等人提出的基于一维复合混沌的图像加密算法进行了安全性分析,发现该算法的两个等效密钥流,从而使得循坏移位操作成为无效......
We cryptanalyze Kim et al ' s one-time proxy signature scheme used in mobile agents, and then a successful forgery i......
失败停止签名计划由使签名人能当伪造品发生时,提供伪造品的一个证明对一个敌人的伪造品为一位签名人向安全提供无限的计算力量。Ch......
遗传算法是一种重要的智能优化算法,在自动控制、组合优化、人工智能等许多领域得到了广泛的应用。非线性组合流密码是一类重要的......
文章对马华等人基于RSA加密算法的叛逆者追踪方案进行分析后,发现该方案存在一个明显的漏洞,并引入随机数解决了存在的问题。通过对......
口令认证是远程身份认证中实用的方法.分析了一个给出的使用智能卡的口令认证方案的安全性,指出该方案是不安全的:不能抵御并行会......
研究了一个基于混沌设计的分组密码算法的安全性,发现该算法所产生的混沌序列具有前几个值对混沌初态和参数的低位比特变化不够敏......
分析了徐淑奖等人提出的一类混沌迭代加密算法的安全性,发现该加密算法由混沌映射产生的量化序列的前几个量化值对混沌初始值低位......