公理 发表于 2025-3-26 23:20:05
Nada EL Kassem,Luís Fiolhais,Paulo Martins,Liqun Chen,Leonel Sousavenous-leak 发表于 2025-3-27 04:52:41
Thomas Trouchkine,Guillaume Bouffard,Jessy Clédièreidiopathic 发表于 2025-3-27 08:42:10
http://reply.papertrans.cn/47/4654/465341/465341_33.pngCapture 发表于 2025-3-27 11:02:33
http://reply.papertrans.cn/47/4654/465341/465341_34.png讥讽 发表于 2025-3-27 16:45:34
Monomial Evaluation of Polynomial Functions Protected by Threshold Implementationsse a new TI without fresh randomness well suited to Substitution-Permutation Networks. As an illustration, we develop our proposal for the AES block cipher, and more specifically its non-linear part implemented thanks to a field inversion. In this particular context, we argue that our proposal is aMalcontent 发表于 2025-3-27 21:27:53
A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things(i) new low-level software optimization techniques to accelerate Karatsuba-based polynomial multiplication on the 8-bit AVR platform and (ii) an efficient implementation of the coefficient modular reduction written in assembly language. The execution time of encapsulation and decapsulation is indepe闯入 发表于 2025-3-28 01:07:15
Analysis of QUIC Session Establishment and Its Implementationsh a special focus on the induced difficulties in the implementation. With our simple stack, we also tested the behaviour of the existing implementations with regards to security-related constraints (explicit or implicit) from the internet drafts. This gives us an interesting view of the state of QUI背带 发表于 2025-3-28 04:59:58
http://reply.papertrans.cn/47/4654/465341/465341_38.png淘气 发表于 2025-3-28 07:49:08
http://reply.papertrans.cn/47/4654/465341/465341_39.pngBureaucracy 发表于 2025-3-28 13:06:17
http://reply.papertrans.cn/47/4654/465341/465341_40.png