NIB 发表于 2025-3-30 09:46:44

Time-Specific Signatures without revealing ., sign a message under a numerical range [., .] such that .. A direct application of TSS is anonymous questionnaire, where each user associated with a numerical value such as age, date, salary, geographical position (represented by longitude and latitude), etc., can anonymously f

choroid 发表于 2025-3-30 12:57:12

Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT like aerial drones. Certificate-free cryptosystems, like identity-based and certificateless systems, lift the burden of certificates and could be a suitable alternative for such IoTs. However, despite their merits, there is a research gap in achieving compatible identity-based and certificateless s

Nebulous 发表于 2025-3-30 16:58:22

http://reply.papertrans.cn/47/4653/465268/465268_53.png

有权 发表于 2025-3-31 00:28:35

http://reply.papertrans.cn/47/4653/465268/465268_54.png

BLAND 发表于 2025-3-31 01:57:25

Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA powerful technique which targets implementations of block ciphers, causes the modern block ciphers to be much more vulnerable than ever before. Up to now, the revised transparency order is one of the best metrics to assess the resistance of S-boxes against DPA attacks. In this paper, we present an

膝盖 发表于 2025-3-31 07:39:03

http://reply.papertrans.cn/47/4653/465268/465268_56.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Information Security; 23rd International C Willy Susilo,Robert H. Deng,Rolly Intan Conference proceedings 2020 Springer Nature Switzerland