搜索结果: 1-6 共查到“密码学 Scheduling”相关记录6条 . 查询时间(0.109 秒)
In many communication scenarios it is not sufficient to protect
only the content of the communication, it is necessary to also protect
the identity of communicating parties. Various protocols and te...
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm
Impossible differential cryptanalysis key recovery attack
2016/1/23
Impossible differential cryptanalysis has been proved to be one of the most powerful techniques to attack block ciphers. Based on the impossible differential paths, we can usually add several rounds...
On a new properties of number sequences ,a randomness test and a new RC4's key scheduling algorithm.
Randomness test Statistical indices RC4 key scheduling
2016/1/9
In this paper, we introduce the concept of the derivative of sequence of numbers and define
new statistical indices by which we discoverd new properties of randomly generated number
sequences. We al...
How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling
traffic analysis encrypted containers
2014/3/11
This paper explores ways of performing commutative tasks by $N$ parties. Tasks are defined as {\sl commutative} if the order at which parties perform tasks can be freely changed without affecting the ...
On the Role of Scheduling in Simulation-Based Security
Scheduling Simulation-Based Security
2008/9/9
In a series of papers, K¨usters et al. investigated the relationships
between various notions of simulation-based security. Two main
factors, the placement of a “master process” and the existence of...
On Non-Randomness of the Permutation after RC4 Key Scheduling
Bias Cryptography Cryptanalysis Key Scheduling Algorithm Banaras Hindu University
2008/6/2
Here we study a weakness of the RC4 Key Scheduling Algorithm
(KSA) that has already been noted by Mantin and Mironov.