为现场 发表于 2025-3-25 04:12:57

http://reply.papertrans.cn/23/2289/228845/228845_21.png

一窝小鸟 发表于 2025-3-25 10:57:46

http://reply.papertrans.cn/23/2289/228845/228845_22.png

BILE 发表于 2025-3-25 12:44:23

Conference proceedings 2019rical analysis, modeling and information security in Morocco, Africa, and worldwide. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory, and information security..

Carbon-Monoxide 发表于 2025-3-25 18:02:50

http://reply.papertrans.cn/23/2289/228845/228845_24.png

逗留 发表于 2025-3-25 21:48:37

http://reply.papertrans.cn/23/2289/228845/228845_25.png

脱毛 发表于 2025-3-26 01:45:50

Mark Carman,Kim-Kwang Raymond Choo-128a but introduces a few changes in order to increase the security and protect against recent cryptanalysis results. The MAC is 64 bits, as specified by the NIST requirements in their lightweight security standardization process.

Terrace 发表于 2025-3-26 07:54:32

Yurong Chen,Tian Lan,Guru Venkataramani paper we propose a variant of their scheme that uses concise vector commitments. We show that our new scheme, when instantiated with a variant of the Pedersen commitment scheme (CRYPTO’92), reduces computation costs by up to . and broadcast communication costs by a factor of ., where . is the length of the commitment message vectors.

咽下 发表于 2025-3-26 12:33:44

http://reply.papertrans.cn/23/2289/228845/228845_28.png

atrophy 发表于 2025-3-26 13:02:13

Speed-up of SCA Attacks on 32-bit Multiplications word increases exponentially required resources: memory and computation power. Considering multiplication, 32-bit operation implies . hypotheses. Then a direct SCA attack cannot be efficiently performed. We propose to perform instead 4 small 8-bit SCA attacks. 32-bit attack complexity is reduced to 8-bit only complexity.

流行 发表于 2025-3-26 20:06:32

http://reply.papertrans.cn/23/2289/228845/228845_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Codes, Cryptology and Information Security; Third International Claude Carlet,Sylvain Guilley,El Mamoun Souidi Conference proceedings 2019