狂怒 发表于 2025-3-28 15:17:04

A Fast Phase-based Enumeration Algorithm for SVP Challenge Through ,-Sparse Representations of Shortrt lattice vectors in lattices from SVP challenge benchmarks [.]. Experimental results show that the phase-based algorithm greatly outperforms other famous enumeration algorithms in running time and achieves higher dimensions, like the Kannan-Helfrich enumeration algorithm. Therefore, the phase-base

几何学家 发表于 2025-3-28 21:19:36

http://reply.papertrans.cn/47/4654/465378/465378_42.png

anesthesia 发表于 2025-3-28 23:39:21

http://reply.papertrans.cn/47/4654/465378/465378_43.png

疲惫的老马 发表于 2025-3-29 04:05:12

Fault Analysis on SIMON Family of Lightweight Block Ciphersistics of the . operation which is a non-linear function of .. Then, we evaluate in detail the number of fault injections required to obtain a secret key. To the best of our knowledge, we are the first to show how to extract the entire secret key for all parameters in the . family using a practical

四牛在弯曲 发表于 2025-3-29 09:54:49

http://reply.papertrans.cn/47/4654/465378/465378_45.png

BIPED 发表于 2025-3-29 13:34:58

Securely Solving Classical Network Flow Problemsinimum mean cycle problem and the minimum cost flow problem. To the best of our knowledge, this is the first time the two last problems have been addressed in a general multi-party computation setting. Furthermore, our study highlights the complexity gaps between traditional and secure implementatio

小步走路 发表于 2025-3-29 18:23:47

http://reply.papertrans.cn/47/4654/465378/465378_47.png

colony 发表于 2025-3-29 20:45:41

Fuyuki Kitagawa,Takahiro Matsuda,Goichiro Hanaoka,Keisuke Tanaka

Infelicity 发表于 2025-3-30 01:39:19

http://reply.papertrans.cn/47/4654/465378/465378_49.png

笨拙的我 发表于 2025-3-30 05:00:05

http://reply.papertrans.cn/47/4654/465378/465378_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Security and Cryptology - ICISC 2014; 17th International C Jooyoung Lee,Jongsung Kim Conference proceedings 2015 Springer Inter