找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security and Privacy; 25th Australasian Co Joseph K. Liu,Hui Cui Conference proceedings 2020 Springer Nature Switzerland AG 202

[复制链接]
楼主: POL
发表于 2025-3-30 11:34:54 | 显示全部楼层
发表于 2025-3-30 15:03:42 | 显示全部楼层
Rotational-XOR Cryptanalysis of Simon-Like Block Cipherselated-key model. In most cases, these are the longest published distinguishers for the respective variants of ...Interestingly, when we apply the model to the block cipher ., the best characteristic we are able to find covers 11 rounds of .32 with probability .. To explain the gap between . and . i
发表于 2025-3-30 18:10:11 | 显示全部楼层
: A Family of Stream-Cipher-Based Space-Hard Ciphersf a block cipher. The security of . against key-extraction attacks in the whitebox setting is reduced to the key-extraction problem for the stream cipher in the blackbox setting. Additionally, we utilize type-2 generalized Feistel network with optimal shuffle layers for the algorithm of . to improve
发表于 2025-3-30 22:47:48 | 显示全部楼层
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithmover 500 thousand characteristics. This result depicts the practicality of the proposed algorithm in constructing large differentials even for a 128-bit block cipher, which could be used to improve cryptanalytic findings against other block ciphers in the future.
发表于 2025-3-31 03:59:19 | 显示全部楼层
Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2and the point operations utilize branch-free (i.e. constant-time) implementation techniques, which increase their ability to resist Simple Power Analysis (SPA) and timing attacks. Our software for scalar multiplication on the SM2 curve is, to our knowledge, the first constant-time implementation of
发表于 2025-3-31 08:23:27 | 显示全部楼层
Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signatu fact leads to inefficiency of schemes..In this work, we revisit the Camenisch-Lysyanskaya signature-based synchronized aggregate signature scheme in FC 2013. This scheme is one of the most efficient synchronized aggregate signature schemes with bilinear groups. However, the security of this synchro
发表于 2025-3-31 12:35:24 | 显示全部楼层
A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithmn average. In addition, the proposed attack, which is successful on distilled neural networks with almost 100% probability, is resistant to defensive distillation. The experimental results also indicate that the robustness of the artificial intelligence algorithm is related to the complexity of the
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-5 06:31
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表