公理 发表于 2025-3-26 23:20:05

Nada EL Kassem,Luís Fiolhais,Paulo Martins,Liqun Chen,Leonel Sousa

venous-leak 发表于 2025-3-27 04:52:41

Thomas Trouchkine,Guillaume Bouffard,Jessy Clédière

idiopathic 发表于 2025-3-27 08:42:10

http://reply.papertrans.cn/47/4654/465341/465341_33.png

Capture 发表于 2025-3-27 11:02:33

http://reply.papertrans.cn/47/4654/465341/465341_34.png

讥讽 发表于 2025-3-27 16:45:34

Monomial Evaluation of Polynomial Functions Protected by Threshold Implementationsse a new TI without fresh randomness well suited to Substitution-Permutation Networks. As an illustration, we develop our proposal for the AES block cipher, and more specifically its non-linear part implemented thanks to a field inversion. In this particular context, we argue that our proposal is a

Malcontent 发表于 2025-3-27 21:27:53

A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things(i) new low-level software optimization techniques to accelerate Karatsuba-based polynomial multiplication on the 8-bit AVR platform and (ii) an efficient implementation of the coefficient modular reduction written in assembly language. The execution time of encapsulation and decapsulation is indepe

闯入 发表于 2025-3-28 01:07:15

Analysis of QUIC Session Establishment and Its Implementationsh a special focus on the induced difficulties in the implementation. With our simple stack, we also tested the behaviour of the existing implementations with regards to security-related constraints (explicit or implicit) from the internet drafts. This gives us an interesting view of the state of QUI

背带 发表于 2025-3-28 04:59:58

http://reply.papertrans.cn/47/4654/465341/465341_38.png

淘气 发表于 2025-3-28 07:49:08

http://reply.papertrans.cn/47/4654/465341/465341_39.png

Bureaucracy 发表于 2025-3-28 13:06:17

http://reply.papertrans.cn/47/4654/465341/465341_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Information Security Theory and Practice; 13th IFIP WG 11.2 In Maryline Laurent,Thanassis Giannetsos Conference proceedings 2020 IFIP Inter