Axillary 发表于 2025-3-27 00:05:55
http://reply.papertrans.cn/47/4648/464782/464782_31.pngcataract 发表于 2025-3-27 03:53:39
http://reply.papertrans.cn/47/4648/464782/464782_32.png我的巨大 发表于 2025-3-27 07:09:35
http://reply.papertrans.cn/47/4648/464782/464782_33.pngLEVY 发表于 2025-3-27 09:48:06
http://reply.papertrans.cn/47/4648/464782/464782_34.pngjumble 发表于 2025-3-27 14:33:32
Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm,, we propose a new countermeasure for SM2 signature algorithm to resist lattice-based fault attack by destroying the condition of lattice attack rather than thwarting fault attack. It is proved the countermeasure can guarantee the ability to resist lattice attack, even if some information of the nonces is leaked.Influx 发表于 2025-3-27 19:22:43
http://reply.papertrans.cn/47/4648/464782/464782_36.pngIsolate 发表于 2025-3-28 01:52:40
Di Jiang,Zhiqiang Liuthe requirements embodied in the WCAG success criteria, so that those reviewing websites can feel reassured that their advice (regarding some of the ways to reduce barriers to access) is helpful and overcomes issues around false positive or negatives. The methods used include image recognition and ngonioscopy 发表于 2025-3-28 04:46:55
http://reply.papertrans.cn/47/4648/464782/464782_38.pngCRUC 发表于 2025-3-28 07:56:10
Asynchronous Computational VSS with Reduced Communication Complexitytisfies the standard VSS definition, and can be used in stand-alone VSS scenarios as well as in applications such as Byzantine agreement. Our second and more intricate protocol satisfies a stronger VSS definition, and is useful in all VSS applications including multiparty computation and threshold cryptography.anagen 发表于 2025-3-28 13:49:53
978-3-8350-0796-3Gabler Verlag | Springer Fachmedien Wiesbaden GmbH, Wiesbaden 2007