预测 发表于 2025-3-26 23:34:03

A Group Action on , and the Generalized DLP with Auxiliary Inputsnly compute . when . has a small divisor ., our algorithm resolves the problem when neither . or . has an appropriate small divisor. Our method exploits a group action of . on . to partition . efficiently.

消毒 发表于 2025-3-27 01:24:19

Solving a ,-bit DLP on a Desktop Computersized finite field of . elements, using just a single core-month. Relative to the previous record set by Joux in the field of . elements, this represents a . increase in the bitlength, using just . of the core-hours. We also show that for the fields considered, the parameters for Joux’s . algorithm may be optimised to produce an . algorithm.

小故事 发表于 2025-3-27 06:41:02

http://reply.papertrans.cn/87/8642/864144/864144_33.png

空气传播 发表于 2025-3-27 11:40:27

http://reply.papertrans.cn/87/8642/864144/864144_34.png

Axon895 发表于 2025-3-27 15:29:45

0302-9743 d system solving); white box crypto; block ciphers; elliptic curves, pairings and RSA; hash functions and MACs; and side-channel attacks. The book also contains 3 full-length invited talks.978-3-662-43413-0978-3-662-43414-7Series ISSN 0302-9743 Series E-ISSN 1611-3349

JAUNT 发表于 2025-3-27 20:46:31

http://reply.papertrans.cn/87/8642/864144/864144_36.png

conjunctiva 发表于 2025-3-28 00:48:06

Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardwaredditionally, we provide solutions for several practical issues with Ring-LWE encryption, including the reduction of ciphertext expansion, error rate and constant-time operation. We hope that this contribution helps to pave the way for the deployment of ideal lattice-based encryption in future real-world systems.

名字的误用 发表于 2025-3-28 02:42:31

Fast Exhaustive Search for Quadratic Systems in , on FPGAstimes less energy than its GPU counterpart. This is a significant improvement, not to mention that the monetary cost per unit of computational power for FPGAs is generally much cheaper than that of GPUs.

作茧自缚 发表于 2025-3-28 10:09:33

Faster Hash-Based Signatures with Bounded Leakagecarefully optimized versions for the respective target platform. The theoretical algorithmic improvements are verified in the implementations and cryptographic hardware accelerators are used to achieve competitive performance.

HEPA-filter 发表于 2025-3-28 14:01:15

http://reply.papertrans.cn/87/8642/864144/864144_40.png
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Selected Areas in Cryptography -- SAC 2013; 20th International C Tanja Lange,Kristin Lauter,Petr Lisoněk Conference proceedings 2014 Spring