搜索结果: 1-7 共查到“军事学 insights”相关记录7条 . 查询时间(0.076 秒)
New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC
Keccak-MAC Divide-and-Conquer Attacks Cube Attacks
2018/1/17
Keccak is the final winner of SHA-3 competition and it can be used as message authentic codes as well. The basic and balanced divide-and-conquer attacks on Keccak-MAC were proposed by Dinur et al. at ...
It has been proved in Eurocrypt 2016 that if the details of the S-boxes are not exploited, an impossible differential and a zero-correlation hull can extend over at most 4 rounds of the AES. This pape...
Algebraic Insights into the Secret Feistel Network (Full version)
High-Degree Indicator Matrix Feistel Network ANF
2016/4/22
We introduce the high-degree indicator matrix (HDIM), an object closely related with both the linear approximation table and the algebraic normal form (ANF) of a permutation. We show that the HDIM of ...
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
Cryptocurrency smart contracts cybersecurity education
2015/12/30
We document our experiences in teaching smart contract programming to undergraduate
students at the University of Maryland, the first pedagogical attempt of its kind. Since smart
contracts deal dire...
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study
cryptographic protocols / voting verifiability coercion-resistance privacy protocol analysis
2012/3/26
In this paper, we present new insights into central properties of voting systems, namely verifiability, privacy, and coercion-resistance. We demonstrate that the combination of the two forms of verifi...
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study
cryptographic protocols / voting verifiability coercion-resistance privacy protocol analysis
2012/3/26
In this paper, we present new insights into central properties of voting systems, namely verifiability, privacy, and coercion-resistance. We demonstrate that the combination of the two forms of verifi...
More Insights on Blockcipher-Based Hash Functions
Blockcipher-Based Hash Functions SBL DBL
2010/12/22
In this paper we give more insights on the security of blockcipher-based hash functions. We give a very simple criterion to build a secure large class of Single-Block-Length (SBL) or double call Doubl...