烦人 发表于 2025-3-30 12:17:52

http://reply.papertrans.cn/23/2289/228845/228845_51.png

COLON 发表于 2025-3-30 15:07:59

Cache-Timing Attacks Still Threaten IoT Devicestion. However when implemented on real systems, cryptographic algorithms are vulnerable to side-channel attacks based on their execution behavior, which can be revealed by measurements of physical quantities such as timing or power consumption. Some countermeasures can be implemented in order to pre

FLING 发表于 2025-3-30 18:26:56

http://reply.papertrans.cn/23/2289/228845/228845_53.png

小故事 发表于 2025-3-31 00:36:31

Arabic Cryptography and Steganography in Moroccove used most of the methods of Arabic cryptography as methods of substitution and transposition. They had also used Al-Mo’tamid’s method of steganography, which consists of using a correspondence between a set of letters of the Arabic alphabet and a set of the bird names, and manipulate the names of

Perennial长期的 发表于 2025-3-31 01:31:18

An AEAD Variant of the Grain Stream Cipherbit key and a 96-bit IV and produces a pseudo random sequence that is used for encryption and authentication of messages. The design is based on Grain-128a but introduces a few changes in order to increase the security and protect against recent cryptanalysis results. The MAC is 64 bits, as specifie
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Codes, Cryptology and Information Security; Third International Claude Carlet,Sylvain Guilley,El Mamoun Souidi Conference proceedings 2019