搜索结果: 1-4 共查到“Equivalent keys”相关记录4条 . 查询时间(0.088 秒)
Understanding Phase Shifting Equivalent Keys and Exhaustive Search
Phase Shifting Equivalent Keys Exhaustive Search specific ciphers
2009/6/3
Recent articles [6, 3, 5, 7] introduce the concept of phase shifting
equivalent keys in stream ciphers, and exploit this concept in order to
mount attacks on some specic ciphers. The idea behind ph...
A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2
cryptanalysis equivalent keys stream cipher DECIM v2
2009/6/3
DECIM v2 is a stream cipher submitted to the ECRYPT
stream cipher project (eSTREAM) and ISO/IEC 18033-4. No attack
against DECIM v2 has been proposed yet. In this paper, we propose a
chosen IV atta...
Equivalent Keys in HFE, C*,and variations
Multivariate Quadratic Equations Public Key signature Hidden Field Equations
2009/4/3
In this article, we investigate the question of equivalent keys for two Multivariate Quadratic
public key schemes HFE and C*¡¡ and improve over a previously known result, to appear at
PK...
Equivalent Keys in Multivariate Quadratic Public Key Systems
Public Key signature Hidden Field Equations Stepwise Triangular Systems
2009/3/19
Multivariate Quadratic public key schemes have been suggested back in 1985 by Matsumoto
and Imai as an alternative for the RSA scheme. Since then, several other schemes have
been proposed, for examp...