找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問(wèn)微社區(qū)

123456
返回列表
打印 上一主題 下一主題

Titlebook: Information Security and Privacy; 25th Australasian Co Joseph K. Liu,Hui Cui Conference proceedings 2020 Springer Nature Switzerland AG 202

[復(fù)制鏈接]
樓主: POL
51#
發(fā)表于 2025-3-30 11:34:54 | 只看該作者
52#
發(fā)表于 2025-3-30 15:03:42 | 只看該作者
Rotational-XOR Cryptanalysis of Simon-Like Block Cipherselated-key model. In most cases, these are the longest published distinguishers for the respective variants of ...Interestingly, when we apply the model to the block cipher ., the best characteristic we are able to find covers 11 rounds of .32 with probability .. To explain the gap between . and . i
53#
發(fā)表于 2025-3-30 18:10:11 | 只看該作者
: A Family of Stream-Cipher-Based Space-Hard Ciphersf a block cipher. The security of . against key-extraction attacks in the whitebox setting is reduced to the key-extraction problem for the stream cipher in the blackbox setting. Additionally, we utilize type-2 generalized Feistel network with optimal shuffle layers for the algorithm of . to improve
54#
發(fā)表于 2025-3-30 22:47:48 | 只看該作者
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithmover 500 thousand characteristics. This result depicts the practicality of the proposed algorithm in constructing large differentials even for a 128-bit block cipher, which could be used to improve cryptanalytic findings against other block ciphers in the future.
55#
發(fā)表于 2025-3-31 03:59:19 | 只看該作者
Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2and the point operations utilize branch-free (i.e. constant-time) implementation techniques, which increase their ability to resist Simple Power Analysis (SPA) and timing attacks. Our software for scalar multiplication on the SM2 curve is, to our knowledge, the first constant-time implementation of
56#
發(fā)表于 2025-3-31 08:23:27 | 只看該作者
Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signatu fact leads to inefficiency of schemes..In this work, we revisit the Camenisch-Lysyanskaya signature-based synchronized aggregate signature scheme in FC 2013. This scheme is one of the most efficient synchronized aggregate signature schemes with bilinear groups. However, the security of this synchro
57#
發(fā)表于 2025-3-31 12:35:24 | 只看該作者
A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithmn average. In addition, the proposed attack, which is successful on distilled neural networks with almost 100% probability, is resistant to defensive distillation. The experimental results also indicate that the robustness of the artificial intelligence algorithm is related to the complexity of the
123456
返回列表
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-19 11:33
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
盐池县| 金溪县| 霍州市| 吴堡县| 通河县| 中西区| 阿勒泰市| 巴彦淖尔市| 乌拉特前旗| 蓬莱市| 遂昌县| 鹿泉市| 扶绥县| 江达县| 彭州市| 永和县| 建瓯市| 日喀则市| 平果县| 阳江市| 尚义县| 桃江县| 武强县| 禹城市| 崇州市| 高要市| 沙湾县| 桂林市| 湾仔区| 大荔县| 新源县| 沛县| 宣恩县| 安义县| 深州市| 合水县| 杭锦后旗| 乐昌市| 康马县| 宜兰县| 左权县|