现晕光 发表于 2025-3-25 03:37:07

A Novel GPU-Based Implementation of the Cube Attacke characteristics of GPU computing. We discuss all design choices, detailing their respective advantages and drawbacks. Other than providing remarkable results, this paper shows how the cube attack can significantly benefit from accelerators like GPUs, paving the way for future work in the area.

分开如此和谐 发表于 2025-3-25 10:53:07

Faster Secure Multi-party Computation of AES and DES Using Lookup Tables above two approaches with an implementation. The table lookup method leads to a very fast online time of over 230,000 blocks per second for AES and 45,000 for Triple DES. The preprocessing cost is not much more than previous methods that have a much slower online time.

conscience 发表于 2025-3-25 14:58:51

http://reply.papertrans.cn/16/1598/159750/159750_23.png

crucial 发表于 2025-3-25 16:23:03

Lattice-Based Group Signatures: Achieving Full Dynamicity with Easechieve this non-trivial feat in a relatively simple manner. Starting with Libert et al.’s fully static construction (Eurocrypt 2016) - which is arguably the most efficient lattice-based group signature to date, we introduce simple-but-insightful tweaks that allow to upgrade it directly into the full

Narrative 发表于 2025-3-25 23:32:22

http://reply.papertrans.cn/16/1598/159750/159750_25.png

痛得哭了 发表于 2025-3-26 03:18:33

978-3-319-61203-4Springer International Publishing AG 2017

逗它小傻瓜 发表于 2025-3-26 08:04:16

https://doi.org/10.1007/978-3-663-02398-2ntity-based encryption schemes. On the one hand, the center-dependent approaches, e.g. cumulative distribution tables (CDT), Knuth-Yao, the alias method, discrete Zigurat and their variants, are the fastest known algorithms to sample from a discrete Gaussian distribution. However, they use a relativ

Germinate 发表于 2025-3-26 11:26:20

https://doi.org/10.1007/978-3-7091-3881-6 exchange of messages of a cryptographic key exchange protocol. The 0-RTT KE concept was first realized by Google in the QUIC Crypto protocol, and a 0-RTT mode has been intensively discussed for inclusion in TLS 1.3..In 0-RTT KE two keys are generated, typically using a Diffie-Hellman key exchange.

Gum-Disease 发表于 2025-3-26 14:27:15

http://reply.papertrans.cn/16/1598/159750/159750_29.png

缩减了 发表于 2025-3-26 19:01:52

https://doi.org/10.1007/978-3-642-50947-6. The security of pairing-based cryptography (PBC) is based on the difficulty in solving the DLP. Hence, it has become necessary to revise the bitlength that the DLP is computationally infeasible against the efficient NFS algorithms. The timing of the main operations of PBC (i.e. pairing, scalar mul
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Applied Cryptography and Network Security; 15th International C Dieter Gollmann,Atsuko Miyaji,Hiroaki Kikuchi Conference proceedings 2017 S