引水渠 发表于 2025-3-27 00:17:41
http://reply.papertrans.cn/47/4653/465283/465283_31.png赏钱 发表于 2025-3-27 01:19:43
Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumpy deviation(NED) of 50% and normalized standard deviation(NSD) of 63% compared with DyCML. Finally, for the AES Sbox simulation, our proposed logic style improves by 31% in NED and by 40% in NSD compared to other secure logics.寡头政治 发表于 2025-3-27 05:52:59
http://reply.papertrans.cn/47/4653/465283/465283_33.png撤退 发表于 2025-3-27 10:05:03
http://reply.papertrans.cn/47/4653/465283/465283_34.pngexplicit 发表于 2025-3-27 17:13:09
http://reply.papertrans.cn/47/4653/465283/465283_35.pngpatriot 发表于 2025-3-27 19:45:58
An Authentication and Key Management Scheme for the Proxy Mobile IPv6per, we point out some security problems of previous authentication scheme associated with ., and also propose a new authentication scheme and key management scheme applicable to .. In addition, it is also shown that the proposed one is more efficient and secure than the previous ones.DAFT 发表于 2025-3-28 00:09:39
http://reply.papertrans.cn/47/4653/465283/465283_37.png著名 发表于 2025-3-28 03:33:01
Anonymity-Based Authenticated Key Agreement with Full Binding Propertym that an anonymous participant has not turned over a session to another anonymous participant while connecting to the verifier and also a session hijacking does not happen. Our approach is to use an anonymous signature scheme with a signer-controlled yet partially enforced linkability. We formally prove that the constructed protocols are secure.Volatile-Oils 发表于 2025-3-28 06:54:28
Conference proceedings 2012ted from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.antecedence 发表于 2025-3-28 12:18:56
Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUssystems on GPU, which can effectively accelerate the QUAD stream cipher. The first approach focuses on formula of summations in quadratics, while the second approach uses parallel reduction to summations. Our approaches can be easily generalized and applied to other multivariate cryptosystems.