Angioplasty 发表于 2025-3-30 08:17:20

,FACE–LIGHT: Fast AES–CTR Mode Encryption for Low-End Microcontrollers, This is faster than previous works by 22 % for 128-bit security level. The FACE–LIGHT can be used to extend the FACE to round 3. The AES is also implemented to be secure against the CPA (Correlation Power Analysis).

缩影 发表于 2025-3-30 13:00:39

Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastaet al. in Journal of Mathematical Cryptology which also uses Generalized Srivastava code. Our KEM provides IND-CCA security in the random oracle model. Also, our scheme can be shown to achieve post-quantum security in the quantum random oracle model.

职业 发表于 2025-3-30 18:14:50

http://reply.papertrans.cn/47/4654/465389/465389_53.png

right-atrium 发表于 2025-3-30 22:29:04

LizarMong: Excellent Key Encapsulation Mechanism Based on RLWE and RLWR,e-of-the-art studies. As a result, it achieves up to 85% smaller bandwidth and 3.3 times faster performance compared to RLizard. Compared to the NIST’s candidate algorithms with a similar security, the bandwidth is about 5–42% smaller, and the performance is about 1.2-4.1 times faster. Also, our scheme resists the known side-channel attacks.

北京人起源 发表于 2025-3-31 04:00:15

Efficient Identity-Based Encryption from LWR, MP12 trapdoor sampling algorithms with an implementation result. With our proposed parameter sets, the ciphertext sizes can be reduced in a large extent compared to the ABB scheme with the same security level.

Seminar 发表于 2025-3-31 07:17:52

http://reply.papertrans.cn/47/4654/465389/465389_56.png

向前变椭圆 发表于 2025-3-31 10:04:39

Security Analysis of Group Action Inverse Problem with Auxiliary Inputs with Application to CSIDH Pntly less than ...Applying the idea to CSIDH-512 parameters, we show that, if an additional isogenous curve . is given, the security level of this cryptosystem reduces to 68-bit security instead of 128-bit security as originally believed.

Rebate 发表于 2025-3-31 16:31:39

0302-9743post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security..978-3-030-40920-3978-3-030-40921-0Series ISSN 0302-9743 Series E-ISSN 1611-3349

Fabric 发表于 2025-3-31 21:34:00

Conference proceedings 2020l, South Korea, in December 2019...The total of 18 papers presented in this volume were carefully reviewed and selected from 43 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quan
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Information Security and Cryptology – ICISC 2019; 22nd International C Jae Hong Seo Conference proceedings 2020 Springer Nature Switzerland