OTHER 发表于 2025-3-30 11:32:43

http://reply.papertrans.cn/16/1598/159750/159750_51.png

漂亮才会豪华 发表于 2025-3-30 14:15:44

http://reply.papertrans.cn/16/1598/159750/159750_52.png

GROVE 发表于 2025-3-30 19:00:57

A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwordsing multiple passwords, which result in a weak password selection. Previous studies have shown that recall success rates are not statistically dissimilar between textual passwords and graphical passwords. With the advent of map-based graphical passwords, this paper focuses on multiple password inter

Cholecystokinin 发表于 2025-3-30 22:11:40

http://reply.papertrans.cn/16/1598/159750/159750_54.png

LAY 发表于 2025-3-31 01:48:04

A Novel GPU-Based Implementation of the Cube Attackplied to virtually any cipher. However, gaining a precise understanding of the characteristics that make a cipher vulnerable to the attack is still an open problem, and no implementation of the cube attack so far succeeded in breaking a real-world strong cipher. In this paper, we present a complete

Antagonist 发表于 2025-3-31 07:07:14

http://reply.papertrans.cn/16/1598/159750/159750_56.png

Infantry 发表于 2025-3-31 12:43:10

http://reply.papertrans.cn/16/1598/159750/159750_57.png

繁忙 发表于 2025-3-31 14:25:18

An Experimental Study of the BDD Approach for the Search LWE Problemard building block in the recent design of lattice based cryptosystems. Nonetheless, a thorough understanding of the security of these schemes from the perspective of existing attacks remains an open problem. In this manuscript, we report our implementation of the Bounded Distance Decoding (BDD) app
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Applied Cryptography and Network Security; 15th International C Dieter Gollmann,Atsuko Miyaji,Hiroaki Kikuchi Conference proceedings 2017 S