广口瓶 发表于 2025-3-30 08:34:44

http://reply.papertrans.cn/15/1475/147499/147499_51.png

flex336 发表于 2025-3-30 15:10:47

http://reply.papertrans.cn/15/1475/147499/147499_52.png

招致 发表于 2025-3-30 18:59:44

http://reply.papertrans.cn/15/1475/147499/147499_53.png

Fresco 发表于 2025-3-30 22:33:22

https://doi.org/10.1007/978-3-8348-9567-7HQC, NTRU Prime, and SIKE. All KEM schemes use variants of the Fujisaki-Okamoto transformation, so the equality test with re-encryption in decapsulation is critical..We survey effective key-recovery attacks when we can skip the equality test. We found the existing key-recovery attacks against Kyber,

Metamorphosis 发表于 2025-3-31 02:46:25

https://doi.org/10.1007/978-3-319-62084-8implementation. It has already been shown that a straightforward combination of SCA and FA countermeasures are vulnerable against FAs, such as Statistical Ineffective Fault Analysis (SIFA) and Fault Template Attacks (FTA). Consequently, new classes of countermeasures have been proposed which prevent

共同时代 发表于 2025-3-31 05:41:36

https://doi.org/10.1007/978-94-009-9628-1terpretable guidelines for the cryptographic engineers implementing these schemes. In this paper, we first present a leakage-resilient MAC that is both efficient and secure under standard and easily interpretable black box and physical assumptions. It only requires a collision resistant hash functio
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Advances in Cryptology – ASIACRYPT 2021; 27th International C Mehdi Tibouchi,Huaxiong Wang Conference proceedings 2021 International Associ