craving 发表于 2025-3-26 23:43:15

On the Construction of Hardware-Friendly , and , S-Boxes Naturally, security is still of paramount importance, but one is willing to trade a part of that security in order to obtain higher speed and/or smaller implementation area. Accordingly, a common metric in many cipher proposals has been the gate count for realizing the cipher in hardware. On the ot

Friction 发表于 2025-3-27 03:59:52

http://reply.papertrans.cn/87/8642/864147/864147_32.png

mucous-membrane 发表于 2025-3-27 07:17:23

Hold Your Breath, PRIMATEs Are Lightweightht in hardware, hence we focus on designs for constrained devices. We provide several serial implementations, smallest of which requires only 1.2 kGE. Additionally, we present a variety of threshold implementations that range from 4.7 kGE to 10.3 kGE..The second part of this work presents a design o

自作多情 发表于 2025-3-27 12:08:45

http://reply.papertrans.cn/87/8642/864147/864147_34.png

Regurgitation 发表于 2025-3-27 17:35:15

http://reply.papertrans.cn/87/8642/864147/864147_35.png

extemporaneous 发表于 2025-3-27 18:04:05

New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity preimage attacks against dithered hash functions were proposed by Andreeva et al. One issue with these second preimage attacks is their huge memory requirement in the precomputation and the online phases. In this paper, we present new second preimage attacks on the dithered Merkle-Damgård construct

Dri727 发表于 2025-3-28 00:45:39

0302-9743 efficient symmetric primitives; cryptanalysis of symmetric primitives; MACs and PRNGs; lattice-based cryptography; and cryptanalysis of asymmetric primitives..978-3-319-69452-8978-3-319-69453-5Series ISSN 0302-9743 Series E-ISSN 1611-3349

expound 发表于 2025-3-28 04:18:28

http://reply.papertrans.cn/87/8642/864147/864147_38.png

exigent 发表于 2025-3-28 07:06:56

http://reply.papertrans.cn/87/8642/864147/864147_39.png

单片眼镜 发表于 2025-3-28 12:51:48

http://reply.papertrans.cn/87/8642/864147/864147_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Selected Areas in Cryptography – SAC 2016; 23rd International C Roberto Avanzi,Howard Heys Conference proceedings 2017 Springer Internation