Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 2 papers published in subject: > since this site started. |
Results per page: |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Improved Rectangle Attack on SMS4 Reduced to 18 Rounds | |||
Kong Xianglong ,Wang Wei ,XU Qiuliang | |||
Computer Science and Technology 31 August 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:SMS4 is a 32-round block cipher with 128-bit block size and 128-bit secret key. It is used in WAPI, the Chinese WLAN national standard. This paper analyzes the security of SMS4 against the rectangle attack. First, this paper describes two properties of SMS4. Next, it proposes the 16-round rectangle distinguisher with probability 2^-250. Finally, the rectangle attack is then carried out on 18-round SMS4 with 2^127 chosen plaintexts and the time complexity is 2^103.83 18-round encryptions. In this process a hash table is used to reduce the time complexity. This attack is the best rectangle attack on SMS4 so far. | |||
TO cite this article:Kong Xianglong ,Wang Wei ,XU Qiuliang. Improved Rectangle Attack on SMS4 Reduced to 18 Rounds[OL].[31 August 2013] http://en.paper.edu.cn/en_releasepaper/content/4557323 |
2. RESEARCH ON CREDIBILITY TECHNOLOGY IN SERVICE ENGINEERING | |||
YANG ZhiFang,YU YanHua,ZHU ChaoPing,XIAO Shan | |||
Computer Science and Technology 13 December 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract: With the development of the Internet world, the service itself and the service environment are becoming more and more complex, service system which bases on service composition faces many new challenges, especially the security of services has become an important research problems. Typically, the service's credibility refer to the behavior and the result of the service are consistent with users' expectations, and its extension including availability, reliability, integrity, maintainability and survivability of service and so on. Intemet's attribute of openness, autonomy and free distribution of central control, heterogeneous and dynamic features of service system itself increase the difficulty of credibility. Relying solely on common services engineering method has been difficult to adapt to the credibility of security requirements.Therefore,we need apply related trusted computing technology to service engineering methodology,and security trust mechanisms should also be added, to dynamically protect the credibility of the service system. | |||
TO cite this article:YANG ZhiFang,YU YanHua,ZHU ChaoPing, et al. RESEARCH ON CREDIBILITY TECHNOLOGY IN SERVICE ENGINEERING[OL].[13 December 2011] http://en.paper.edu.cn/en_releasepaper/content/4455559 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
Results per page: |
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated