>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到uniformity相关记录38条 . 查询时间(0.044 秒)
In order to study the resistance of a block cipher against boomerang attacks, a tool called the Boomerang Connectivity Table (BCT) for S-boxes was recently introduced. Very little is known today about...
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphers based on differential cryptanalysis. In particular it takes into consideration two differentials,...
At Eurocrypt'18, Cid, Huang, Peyrin, Sasaki, and Song introduced a new tool called Boomerang Connectivity Table (BCT) for measuring the resistance of a block cipher against the boomerang attack which ...
In EUROCRYPT 2018, Cid et al. introduced a new concept on the cryptographic property of S-boxes: Boomerang Connectivity Table (BCT for short) for evaluating the subtleties of boomerang-style attacks. ...
Little theoretical work has been done on (n,m)(n,m)-functions when n2nn2unctions can be used in Feistel ciphers, and actually play an important role in several block cipher...
We revisit security proofs for various cryptographic primitives in the auxiliary-input random-oracle model (AI-ROM), in which an attacker AA can compute arbitrary SS bits of leakage about the random o...
In the preprint [Characterizations of the differential uniformity of vectorial functions by the Walsh transform, IACR ePrint Archive 2017/516], the author has, for each even positive δδ, characterized...
For every positive integers nn, mm and every even positive integer δδ, we derive inequalities satisfied by the Walsh transforms of all vectorial (n,m)(n,m)-functions and prove that the case of equalit...
Recently, many new classes of differentially 44-uniform permutations have been constructed. However, it is difficult to decide whether they are CCZ-inequivalent or not. In this paper, we propose a new...
Since they were first proposed as a countermeasure against differential power analysis (DPA) in 2006, threshold schemes have attracted a lot of attention from the community concentrating on cryptograp...
We present a denoising algorithm for the pixel-response non-uniformity correction of a scientific complementary metal–oxide–semiconductor (CMOS) image sensor, which captures images under extremely low...
We consider sliced computer experiments where priori knowledge suggests that factors may have different levels of importance, and so some factors need to be paid more attention than others. A new clas...
We consider sliced computer experiments where priori knowledge suggests that factors may have different levels of importance, and so some factors need to be paid more attention than others. A new clas...
We provide a symbolic model for multi-party computation based on linear secret-sharing scheme, and prove that this model is computationally sound: if there is an attack in the computational world, t...
During rapid thermal processing (RTP) of a semiconductor wafer, maintenance of near-uniform wafer temperature distribution is necessary. This paper addresses the problem of insuring temperature unifor...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...