遗产 发表于 2025-3-23 11:16:03

http://reply.papertrans.cn/93/9262/926136/926136_11.png

商品 发表于 2025-3-23 15:51:59

http://reply.papertrans.cn/93/9262/926136/926136_12.png

排斥 发表于 2025-3-23 21:41:14

Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128,icient masked implementations for side-channel resistance, reducing the number of multiplications has become a quite popular trend for the symmetric cryptographic primitive designs. With an aggressive design strategy exploiting the extremely simple and low-degree S-box and low number of rounds, ., t

反感 发表于 2025-3-24 00:09:29

http://reply.papertrans.cn/93/9262/926136/926136_14.png

密切关系 发表于 2025-3-24 04:38:52

Side-Channeling the Kalyna Key Expansion,design is based on AES, but includes several different features. Most notably, the key expansion in Kalyna is designed to resist recovering the master key from the round keys..In this paper we present a cache attack on the Kalyna key expansion algorithm. Our attack observes the cache access pattern

JADED 发表于 2025-3-24 06:39:54

http://reply.papertrans.cn/93/9262/926136/926136_16.png

MOAT 发表于 2025-3-24 12:17:51

http://reply.papertrans.cn/93/9262/926136/926136_17.png

decipher 发表于 2025-3-24 16:33:59

On Fingerprinting Attacks and Length-Hiding Encryption,b pages visited by a user and even the language and phrases spoken in voice-over-IP conversations..Prior research has established the general perspective that a length-hiding padding which is long enough to improve security significantly incurs an unfeasibly large bandwidth overhead. We argue that t

Inferior 发表于 2025-3-24 19:12:20

http://reply.papertrans.cn/93/9262/926136/926136_19.png

发起 发表于 2025-3-25 00:54:06

http://reply.papertrans.cn/93/9262/926136/926136_20.png
页: 1 [2] 3 4
查看完整版本: Titlebook: Topics in Cryptology – CT-RSA 2022; Cryptographers’ Trac Steven D. Galbraith Conference proceedings 2022 The Editor(s) (if applicable) and