ARBOR 发表于 2025-3-28 17:29:47

http://reply.papertrans.cn/47/4654/465371/465371_41.png

Deceit 发表于 2025-3-28 19:32:01

http://reply.papertrans.cn/47/4654/465371/465371_42.png

倾听 发表于 2025-3-29 01:31:55

http://reply.papertrans.cn/47/4654/465371/465371_43.png

Palpate 发表于 2025-3-29 04:50:45

http://reply.papertrans.cn/47/4654/465371/465371_44.png

泛滥 发表于 2025-3-29 07:55:18

V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architectureger representation, finite field, point arithmetic and scalar multiplication, in which the large integer operation optimizations can be extended to other elliptic curve public key cryptography schemes. Our V-Cruve25519 also takes into account the side-channel protection security implementation, whic

Conflagration 发表于 2025-3-29 15:14:22

Improved Integral Cryptanalysis of Block Ciphers BORON and Khudraion property propagation through S-boxes of BORON and Khudra are both reduced from 11 to 7 by our methods. Besides, the best 7-round integral distinguisher for BORON, and the best 9-round integral distinguisher with the smallest data complexity for Khudra are found based on the smaller scale of the

LAST 发表于 2025-3-29 16:12:13

Automatic Search of Linear Structure: Applications to , and s, and translate the problem of finding the best preimage attacks into searching for optimal linear structure problems. We propose a new bit-level SAT-based automatic tool to search for optimal linear structures. The SAT model captures a large solution space of linear structures. Based on our tool,

GAVEL 发表于 2025-3-29 23:28:08

http://reply.papertrans.cn/47/4654/465371/465371_48.png

Ethics 发表于 2025-3-30 03:51:36

http://reply.papertrans.cn/47/4654/465371/465371_49.png

万花筒 发表于 2025-3-30 07:41:55

http://reply.papertrans.cn/47/4654/465371/465371_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Security and Cryptology; 19th International C Chunpeng Ge,Moti Yung Conference proceedings 2024 The Editor(s) (if applicable) a