Wilson 发表于 2025-3-21 17:37:52

书目名称Information Security and Cryptology – ICISC 2023影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465394<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2023影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465394<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2023网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465394<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2023网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465394<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2023被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465394<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2023被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465394<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2023年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465394<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2023年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465394<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2023读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465394<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2023读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465394<br><br>        <br><br>

讲个故事逗他 发表于 2025-3-21 22:10:46

http://reply.papertrans.cn/47/4654/465394/465394_2.png

危机 发表于 2025-3-22 02:29:21

Finding Shortest Vector Using Quantum NV Sieve on Groverplement the extended version of the quantum NV Sieve (i.e., the dimension and rank of the lattice vector). Our extended implementation could be instrumental in extending the upper limit of SVP (currently, determining the upper limit of SVP is a vital factor). Lastly, we estimate the quantum resource

生意行为 发表于 2025-3-22 07:20:06

Quantum Circuits for High-Degree and Half-Multiplication for Post-quantum Analysise utilization of the Toom-Cook 8.5-way method, we reach the lowest asymptotic performance and quantum resources usage for multiplication operation in comparison to the existing Toom-Cook-based multiplication designs with . Toffoli count and . Toffoli depth. The designed multiplication yields a qubit

营养 发表于 2025-3-22 10:14:02

Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakagestroduced a linear programming problem with parameters to evaluate the number of signatures, time, and memory required for a Fourier analysis-based attack. They also employed a SageMath module to optimize the number of signatures and time required for the attack. Furthermore, we show by experiments t

notice 发表于 2025-3-22 16:06:55

Single Trace Analysis of Comparison Operation Based Constant-Time CDT Sampling and Its Countermeasurcomparison operations on values exceeding 8 bits by dividing them into 8-bit blocks. Consequently, the execution time of a CDT sampling operation is influenced by the outcome of each block’s comparison operation due to conditional branching. To address these concerns, this paper begins by summarizin

五行打油诗 发表于 2025-3-22 19:19:25

http://reply.papertrans.cn/47/4654/465394/465394_7.png

ALLEY 发表于 2025-3-22 22:41:02

Side-Channel Analysis on Lattice-Based KEM Using Multi-feature Recognition - The Case Study of Kybermproves the correct key guess rate by 54% compared to single-feature recovery and is robust against invalid attacks caused by errors in single-feature recovery. Our approach was performed against the Kyber768 implementation from . running on STM32F429 M4-cortex CPU.

烦忧 发表于 2025-3-23 03:52:36

1-out-of-, Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Com of a 1-out-of-. oblivious signature scheme by Zhou et al. (IEICE Trans 2022). We reduce the communication cost by modifying their scheme with a Merkle tree. Then we prove the security of our modified scheme.

陶瓷 发表于 2025-3-23 06:01:25

Compact Identity-Based Signature and Puncturable Signature from SQISignMore interestingly, our IBS achieves the most compact key and signature size compared to existing isogeny-based IBS schemes. Leveraging our proposed IBS, we introduce the . Short Quaternion and Isogeny Puncturable Signature (.) which allows for selective revocation of signatures and is supported by
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Information Security and Cryptology – ICISC 2023; 26th International C Hwajeong Seo,Suhri Kim Conference proceedings 2024 The Editor(s) (if