搜索结果: 1-8 共查到“军事学 New Results”相关记录8条 . 查询时间(0.295 秒)
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Modular inversion hidden number problem inversive congruential generator lattice
2019/6/3
The Modular Inversion Hidden Number Problem (MIHNP), introduced by Boneh, Halevi and Howgrave-Graham in Asiacrypt 2001, is briefly described as follows: Let MSBδ(z)MSBδ(z) refer to the δδ most signifi...
New Results about the Boomerang Uniformity of Permutation Polynomials
Finite Field Boomerang Connectivity Table Boomerang Uniformity
2019/1/29
In EUROCRYPT 2018, Cid et al. introduced a new concept on the cryptographic property of S-boxes: Boomerang Connectivity Table (BCT for short) for evaluating the subtleties of boomerang-style attacks. ...
New Results in the Linear Cryptanalysis of DES
linear cryptanalysis multiple linear approximations success probability
2016/1/9
Two open problems on using Matsui’s Algorithm 2 with multiple linear approximations
posed earlier by Biryukov, De Canni`ere and M. Quisquater at Crypto’04 are
solved in the present paper. That impro...
Some New Results on Binary Polynomial Multiplication
Polynomial multiplication binary fields
2016/1/4
This paper presents several methods for reducing the number of bit operations for multiplication of
polynomials over the binary field. First, a modified Bernstein’s 3-way algorithm is introduced, fol...
New Results on Identity-based Encryption from Quadratic Residuosity
New Results Quadratic Residuosity
2015/12/23
This invited talk surveys the results obtained so far in designing
identity-based encryption (IBE) schemes based on the quadratic
residuosity assumption (QRA). We begin by describing the first such
...
In this paper, we investigate the difficulty of the Isomorphism of Polynomials (IP) Problem
as well as one of its variant IP1S. The Isomorphism of Polynomials is a well-known problem studied in
mult...
New Results on Unconditionally Secure Multi-receiver Manual Authentication
manual channel (interactive) multireceiver authentication security
2009/6/2
Manual authentication is a recently proposed model of com-
munication motivated by the settings where the only trusted infras-
tructure is a low bandwidth authenticated channel, possibly realized by...
New Results on Multipartite Access Structures.