找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Applied Cryptography and Network Security; 15th International C Dieter Gollmann,Atsuko Miyaji,Hiroaki Kikuchi Conference proceedings 2017 S

[复制链接]
楼主: centipede
发表于 2025-3-25 03:37:07 | 显示全部楼层
A Novel GPU-Based Implementation of the Cube Attacke characteristics of GPU computing. We discuss all design choices, detailing their respective advantages and drawbacks. Other than providing remarkable results, this paper shows how the cube attack can significantly benefit from accelerators like GPUs, paving the way for future work in the area.
发表于 2025-3-25 10:53:07 | 显示全部楼层
Faster Secure Multi-party Computation of AES and DES Using Lookup Tables above two approaches with an implementation. The table lookup method leads to a very fast online time of over 230,000 blocks per second for AES and 45,000 for Triple DES. The preprocessing cost is not much more than previous methods that have a much slower online time.
发表于 2025-3-25 14:58:51 | 显示全部楼层
发表于 2025-3-25 16:23:03 | 显示全部楼层
Lattice-Based Group Signatures: Achieving Full Dynamicity with Easechieve this non-trivial feat in a relatively simple manner. Starting with Libert et al.’s fully static construction (Eurocrypt 2016) - which is arguably the most efficient lattice-based group signature to date, we introduce simple-but-insightful tweaks that allow to upgrade it directly into the full
发表于 2025-3-25 23:32:22 | 显示全部楼层
发表于 2025-3-26 03:18:33 | 显示全部楼层
978-3-319-61203-4Springer International Publishing AG 2017
发表于 2025-3-26 08:04:16 | 显示全部楼层
https://doi.org/10.1007/978-3-663-02398-2ntity-based encryption schemes. On the one hand, the center-dependent approaches, e.g. cumulative distribution tables (CDT), Knuth-Yao, the alias method, discrete Zigurat and their variants, are the fastest known algorithms to sample from a discrete Gaussian distribution. However, they use a relativ
发表于 2025-3-26 11:26:20 | 显示全部楼层
https://doi.org/10.1007/978-3-7091-3881-6 exchange of messages of a cryptographic key exchange protocol. The 0-RTT KE concept was first realized by Google in the QUIC Crypto protocol, and a 0-RTT mode has been intensively discussed for inclusion in TLS 1.3..In 0-RTT KE two keys are generated, typically using a Diffie-Hellman key exchange.
发表于 2025-3-26 14:27:15 | 显示全部楼层
发表于 2025-3-26 19:01:52 | 显示全部楼层
https://doi.org/10.1007/978-3-642-50947-6. The security of pairing-based cryptography (PBC) is based on the difficulty in solving the DLP. Hence, it has become necessary to revise the bitlength that the DLP is computationally infeasible against the efficient NFS algorithms. The timing of the main operations of PBC (i.e. pairing, scalar mul
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-8 11:41
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表