引水渠
发表于 2025-3-27 00:17:41
http://reply.papertrans.cn/47/4653/465283/465283_31.png
赏钱
发表于 2025-3-27 01:19:43
Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumpy deviation(NED) of 50% and normalized standard deviation(NSD) of 63% compared with DyCML. Finally, for the AES Sbox simulation, our proposed logic style improves by 31% in NED and by 40% in NSD compared to other secure logics.
寡头政治
发表于 2025-3-27 05:52:59
http://reply.papertrans.cn/47/4653/465283/465283_33.png
撤退
发表于 2025-3-27 10:05:03
http://reply.papertrans.cn/47/4653/465283/465283_34.png
explicit
发表于 2025-3-27 17:13:09
http://reply.papertrans.cn/47/4653/465283/465283_35.png
patriot
发表于 2025-3-27 19:45:58
An Authentication and Key Management Scheme for the Proxy Mobile IPv6per, we point out some security problems of previous authentication scheme associated with ., and also propose a new authentication scheme and key management scheme applicable to .. In addition, it is also shown that the proposed one is more efficient and secure than the previous ones.
DAFT
发表于 2025-3-28 00:09:39
http://reply.papertrans.cn/47/4653/465283/465283_37.png
著名
发表于 2025-3-28 03:33:01
Anonymity-Based Authenticated Key Agreement with Full Binding Propertym that an anonymous participant has not turned over a session to another anonymous participant while connecting to the verifier and also a session hijacking does not happen. Our approach is to use an anonymous signature scheme with a signer-controlled yet partially enforced linkability. We formally prove that the constructed protocols are secure.
Volatile-Oils
发表于 2025-3-28 06:54:28
Conference proceedings 2012ted from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.
antecedence
发表于 2025-3-28 12:18:56
Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUssystems on GPU, which can effectively accelerate the QUAD stream cipher. The first approach focuses on formula of summations in quadratics, while the second approach uses parallel reduction to summations. Our approaches can be easily generalized and applied to other multivariate cryptosystems.