壕沟 发表于 2025-3-28 15:43:39

Differential Analysis of the Ternary Hash Function Troikader to be used inside IOTA’s distributed ledger but could also serve in all settings requiring the generation of ternary randomness. To be used in practice, Troika needs to be proven secure against state-of-the-art cryptanalysis. However, there are today almost no analysis tools for ternary designs.

Exposure 发表于 2025-3-28 21:54:46

http://reply.papertrans.cn/87/8642/864133/864133_42.png

abduction 发表于 2025-3-29 00:40:20

Injective Rank Metric Trapdoor Functions with Homogeneous Errors The rank decoding problem which is the analogue of the problem of decoding a random linear code consists in recovering a basis of a random noise vector that was used to perturb a set of random linear equations sharing a secret solution. Assuming the intractability of this problem, we introduce a ne

不怕任性 发表于 2025-3-29 07:03:14

: Persistent and Distributed Key Acquisition for Secure Storage from Passwordsraphic guarantees. Many IM users regularly change their devices and use multiple devices simultaneously, ruling out any long-term secret storage. Extending the end-to-end encryption guarantees from just message communication to also incorporate backups has so far required either some trust in an IM

collagen 发表于 2025-3-29 08:38:27

http://reply.papertrans.cn/87/8642/864133/864133_45.png

ticlopidine 发表于 2025-3-29 14:57:37

http://reply.papertrans.cn/87/8642/864133/864133_46.png

Permanent 发表于 2025-3-29 15:57:45

Patient Zero & Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKEpand on such attacks by analyzing the behavior of the zero curve . and six curve . in CSIDH and SIKE. We demonstrate an attack on static-key CSIDH and SIKE implementations that recovers bits of the secret key by observing via zero-value-based resp. exploiting correlation-collision-based side-channel

Abduct 发表于 2025-3-29 21:22:31

An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves order . inside their endomorphism ring. Prior to this work, the only known effective lower-bound is restricted to small discriminants. Our main result targets the case of fundamental discriminants and we derive a generic bound using the expansion properties of the supersingular isogeny graphs..Our

Working-Memory 发表于 2025-3-30 02:19:35

http://reply.papertrans.cn/87/8642/864133/864133_49.png
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Selected Areas in Cryptography; 29th International C Benjamin Smith,Huapeng Wu Conference proceedings 2024 The Editor(s) (if applicable) an