CT951 发表于 2025-3-21 17:45:51

书目名称Information Security and Cryptoloy - ICISC 2008影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465384<br><br>        <br><br>书目名称Information Security and Cryptoloy - ICISC 2008影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465384<br><br>        <br><br>书目名称Information Security and Cryptoloy - ICISC 2008网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465384<br><br>        <br><br>书目名称Information Security and Cryptoloy - ICISC 2008网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465384<br><br>        <br><br>书目名称Information Security and Cryptoloy - ICISC 2008被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465384<br><br>        <br><br>书目名称Information Security and Cryptoloy - ICISC 2008被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465384<br><br>        <br><br>书目名称Information Security and Cryptoloy - ICISC 2008年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465384<br><br>        <br><br>书目名称Information Security and Cryptoloy - ICISC 2008年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465384<br><br>        <br><br>书目名称Information Security and Cryptoloy - ICISC 2008读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465384<br><br>        <br><br>书目名称Information Security and Cryptoloy - ICISC 2008读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465384<br><br>        <br><br>

otic-capsule 发表于 2025-3-21 22:36:21

http://reply.papertrans.cn/47/4654/465384/465384_2.png

WAIL 发表于 2025-3-22 00:38:19

http://reply.papertrans.cn/47/4654/465384/465384_3.png

LAITY 发表于 2025-3-22 04:43:14

Secure Hardware Implementation of Non-linear Functions in the Presence of Glitchesduce the hardware requirements of this method and show how to derive provable secure implementations of some non-linear building blocks for cryptographic algorithms. Finally, we provide a provable secure implementation of the block cipher Noekeon and verify the results.

commodity 发表于 2025-3-22 09:05:45

A Single-Key Domain Extender for Privacy-Preserving MACs and PRFsent than PRF, iCBC-MAC works with a single key like HMAC and runs as efficiently as HMAC. Moreover, iCBC-MAC becomes even faster than HMAC, depending on the choice of security parameters. Additionally, iCBC-MAC is multi-property-preserving in the sense that it operates as a domain extender for both PP-MACs and PRFs.

irradicable 发表于 2025-3-22 13:15:18

Extended Models for Message Authentications facing side channel attacks, but also give us an insight view of MA-schemes. As an example, we consider the security of .9 (a MA-scheme in 3GPP) and its variants in an extended model. The result helps us to know .9 better, e.g. how to use it safely and what measures need to be taken in case of potential attacks.

手势 发表于 2025-3-22 19:18:27

http://reply.papertrans.cn/47/4654/465384/465384_7.png

gimmick 发表于 2025-3-22 22:51:05

The Swiss-Knife RFID Distance Bounding Protocolne in terms of security, privacy, tag computational overhead, and fault tolerance. We also point out a weakness in Tu and Piramuthu’s protocol, which was considered up to now as one of the most efficient distance bounding protocol.

monopoly 发表于 2025-3-23 05:18:33

How to Balance Privacy with Authenticityer) will cease. We consider real scenarios where this type of notion is required. We formalize this notion as a ., and for the first time in the literature, we provide a concrete scheme to realize this primitive.

推延 发表于 2025-3-23 07:48:50

http://reply.papertrans.cn/47/4654/465384/465384_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security and Cryptoloy - ICISC 2008; 11th International C Pil Joong Lee,Jung Hee Cheon Conference proceedings 2009 Springer-Ver