搜索结果: 1-15 共查到“军事学 Modified”相关记录15条 . 查询时间(0.156 秒)
A Modified pqsigRM: RM Code-Based Signature Scheme
Code-based cryptography Courtois Finiasz
2019/6/12
We propose a novel signature scheme based on a modified Reed--Muller (RM) code, which reduces the signing complexity and key size compared to existing code-based signature schemes. This cheme is calle...
A Modified Simple Substitution Cipher With Unbounded Unicity Distance
finite-key unicity randomization
2019/6/4
The classic simple substitution cipher is modified by randomly inserting key-defined noise characters into the ciphertext in encryption which are ignored in decryption. Interestingly, this yields a fi...
On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes
parity check linear cryptanalysis linear characteristics
2017/2/20
We investigate the effect of inserting extra linearity in the Data Encryption Standard (DES) through appropriate singular linear encodings of the output of the individual S-boxes. More specifically, w...
Healing the Hill Cipher, Improved Approach to Secure Modified Hill against Zero-plaintext Attack
Hill Cipher Zero-plaintext Attack Chaotic Map
2016/12/10
Hill Cipher is a symmetric cryptosystem that was claimed to suffer from known-plaintext attack for many years. Different methods have been proposed to make this cipher more secure against known attack...
A modified block Lanczos algorithm with fewer vectors
fewer vectors block Lanczos algorithm
2016/3/28
The block Lanczos algorithm proposed by Peter Montgomery
is an efficient means to tackle the sparse linear algebra problem which
arises in the context of the number field sieve factoring algorithm a...
In this paper, analysis of a simply modified RC4 algorithm is presented. RC4 is the most widely used stream cipher and it is not considered as a cipher that is strong in security. Many alternatives ha...
In this article, a new symmetric block cipher named MSEA is proposed. MSEA is based on ARX cryptographic design technique. MSEA is simple in nature due to the use of combinations of elementary oper...
Modified Alternating Step Generators with Non-Linear Scrambler
stream ciphers alternating step generators linear/nonlinear feedback shift registers
2016/1/5
Pseudorandom generators, which produce keystreams for stream ciphers by the exclusive-or sum
of output bits from alternately clocked linear feedback shift registers, are vulnerable to cryptanalysis. ...
Irregular clocking of feedback shift registers is a popular technique to improve parameters of keystream generators in stream ciphers. Another technique is to implement nonlinear functions. We join th...
A modified eCK model with stronger security for tripartite authenticated key exchange
Zhengzhou Information Science and Technology Institute
2010/2/1
Since Bellare and Rogaway presented the first formal security model for
authenticated key exchange (AKE) protocols in 1993, many formal security
models have been proposed. The extended Canetti-Krawc...
Modified Huang-Wang’s Convertible Nominative Signature Scheme
Digital signature nominative signature convertible selectively
2009/6/5
At ACISP 2004, Huang and Wang first introduced the
concept of convertible nominative signatures and also proposed
a concrete scheme. However, it was pointed out by
many works that Huang-Wang’s sche...
A Comparison Between Hardware Accelerators for the Modified Tate Pairing over F2m and F3m
modified Tate pairing finite field arithmetic elliptic curve
2009/6/3
In this article we propose a study of the modified Tate pairing
in characteristics two and three. Starting from the T pairing introduced
by Barreto et al. [1], we detail various algorithmic improvem...
THE DESIGN OF BOOLEAN FUNCTIONS BY MODIFIED HILL CLIMBING METHOD
Boolean functions symmetric cryptosystem bent function
2009/6/3
With cryptographic investigations, the design of
Boolean functions is a wide area. The Boolean functions
play important role in the construction of a symmetric cryp-
tosystem. In this paper the mod...
A Secure Modified ID-based Undeniable Signature Scheme
undeniable signatures identity-based signatures convertible undeniable signature
2009/4/10
Han et al. proposed the first identity-based undeniable signature scheme at the fourth ACMconference
on electronic commerce. Zhang et al. showed two attacks (the denial attack and the forge attack) a...
Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures
Modified Parameter Attacks Practical Attacks CCA2 Secure Cryptosystems Countermeasures
2009/4/3
We introduce the concept of Modi¯ed Parameter Attacks, a
natural extension of the idea of Adapative Chosen Ciphertext Attacks
(CCA2) under which some CCA2 secure systems can be shown to be
ins...