尖酸好 发表于 2025-3-21 19:02:10
书目名称Information Security and Privacy影响因子(影响力)<br> http://impactfactor.cn/if/?ISSN=BK0465419<br><br> <br><br>书目名称Information Security and Privacy影响因子(影响力)学科排名<br> http://impactfactor.cn/ifr/?ISSN=BK0465419<br><br> <br><br>书目名称Information Security and Privacy网络公开度<br> http://impactfactor.cn/at/?ISSN=BK0465419<br><br> <br><br>书目名称Information Security and Privacy网络公开度学科排名<br> http://impactfactor.cn/atr/?ISSN=BK0465419<br><br> <br><br>书目名称Information Security and Privacy被引频次<br> http://impactfactor.cn/tc/?ISSN=BK0465419<br><br> <br><br>书目名称Information Security and Privacy被引频次学科排名<br> http://impactfactor.cn/tcr/?ISSN=BK0465419<br><br> <br><br>书目名称Information Security and Privacy年度引用<br> http://impactfactor.cn/ii/?ISSN=BK0465419<br><br> <br><br>书目名称Information Security and Privacy年度引用学科排名<br> http://impactfactor.cn/iir/?ISSN=BK0465419<br><br> <br><br>书目名称Information Security and Privacy读者反馈<br> http://impactfactor.cn/5y/?ISSN=BK0465419<br><br> <br><br>书目名称Information Security and Privacy读者反馈学科排名<br> http://impactfactor.cn/5yr/?ISSN=BK0465419<br><br> <br><br>火海 发表于 2025-3-21 22:12:19
Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithmical collision attacks. This observation led to attacks for more rounds on some .-like hash functions. In this paper, we quantize the multi-collision distinguisher proposed by Biryukov, Khovratovich, and Nikolić at CRYPTO 2009, and propose quantum multi-collision distinguishers. We use CP-tool to auacheon 发表于 2025-3-22 00:57:38
http://reply.papertrans.cn/47/4655/465419/465419_3.pngPalliation 发表于 2025-3-22 05:11:47
An Efficient Hardware Implementation of Crystal-Dilithium on FPGAther candidates, Dilithium is well-suited for hardware implementation, primarily due to its avoidance of floating-point operations and the distribution of coefficients over a finite field with a small prime. Nevertheless, its practical implementations still face challenges due to its demanding polyn很像弓] 发表于 2025-3-22 09:08:44
Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Primespecify a fixed number of registers, each holding a power-of-two number of bits, and support a wide variety of vector arithmetic on registers. Programmers then try to align mathematical computations with the vector arithmetic supported by the designated instruction set or extension. We delve into th声音刺耳 发表于 2025-3-22 15:12:31
Jumping for Bernstein-Yang Inversion processor architectures: Cortex-A53, Cortex-A72, Cortex-A76 and Apple M1. We utilize the . divison steps of the constant-time GCD algorithm from Bernstein and Yang (TCHES’19) and optimize underlying polynomial multiplication of various lengths to improve the efficiency for computing polynomial inve动作谜 发表于 2025-3-22 20:27:02
http://reply.papertrans.cn/47/4655/465419/465419_7.png种属关系 发表于 2025-3-22 22:19:15
http://reply.papertrans.cn/47/4655/465419/465419_8.pngobservatory 发表于 2025-3-23 04:27:26
Revisiting the Security of Fiat-Shamir Signature Schemes Under Superposition Attacksved from secure identification (ID) schemes. However, the existing security proof only takes into account . signing queries and does not consider ., where the signing oracle is quantum-accessible to the adversaries. Alagic et al. proposed a security model called . (BUF, Eurocrypt’20), regarded as a实现 发表于 2025-3-23 08:19:18
Improved Lattice-Based Attack on Mersenne Low Hamming Ratio Search Problemnce the existing lattice-based attack on the Mersenne low Hamming ratio search problem. Unlike the previous approach of directly employing lattice reduction algorithm, we apply the lattice-based method to solving polynomial equations derived from the above problem. We extend the search range for vul