標(biāo)題: Titlebook: Information Security and Cryptology – ICISC 2021; 24th International C Jong Hwan Park,Seung-Hyun Seo Conference proceedings 2022 The Editor [打印本頁] 作者: Localized 時間: 2025-3-21 18:45
書目名稱Information Security and Cryptology – ICISC 2021影響因子(影響力)
書目名稱Information Security and Cryptology – ICISC 2021影響因子(影響力)學(xué)科排名
書目名稱Information Security and Cryptology – ICISC 2021網(wǎng)絡(luò)公開度
書目名稱Information Security and Cryptology – ICISC 2021網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security and Cryptology – ICISC 2021被引頻次
書目名稱Information Security and Cryptology – ICISC 2021被引頻次學(xué)科排名
書目名稱Information Security and Cryptology – ICISC 2021年度引用
書目名稱Information Security and Cryptology – ICISC 2021年度引用學(xué)科排名
書目名稱Information Security and Cryptology – ICISC 2021讀者反饋
書目名稱Information Security and Cryptology – ICISC 2021讀者反饋學(xué)科排名
作者: 吹牛者 時間: 2025-3-21 21:23
Delegating Supersingular Isogenies over , with Cryptographic Applications-key computation step of SIDH/SIKE by a factor 5 and zero-knowledge proofs of identity by a factor 16 for the prover, while it becomes almost free for the verifier, respectively, at the NIST security level 1.作者: Collision 時間: 2025-3-22 01:47
Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Latticelearning with errors (.) problem, we elaborately select 3 parameter sets to meet different application scenarios (e.g., classical/quantum-safe Transport Layer Security (TLS), resource-constrained Internet of Things (IoT) devices). Specifically, our . implementation achieves 177-bit post-quantum secu作者: 向下 時間: 2025-3-22 07:32
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methodsve Reordering (DPR) method permutating the projected vectors in its dual lattice. In addition, we propose a condition to decide whether the reordering method should be adopted or not. Preliminary experimental results show that our proposed reordering methods can successfully reduce the number of ENU作者: exceptional 時間: 2025-3-22 11:09 作者: 信徒 時間: 2025-3-22 13:05
Algebraic Attacks on?Grain-Like Keystream Generatorssearched. This investigation highlights the importance of the filter function in keystream generators with a “Grain-like” structure, and demonstrates that many functions previously considered secure are vulnerable to this attack.作者: 裝勇敢地做 時間: 2025-3-22 18:33
ff?and the other for ecological sustainability?from McHarg. Because now each of them compete for primacy, the suggestion of this paper is that their cooperation should be better fruitful because they could—as is needed—integrate ecology and equity in the next urban and regional change. Put in this t作者: 聚集 時間: 2025-3-22 21:57
Yuki Okano,Junichi Tomida,Akira Nagai,Kazuki Yoneyama,Atsushi Fujioka,Koutarou Suzukirbanization. In particular, this contribution suggests a posture to dig into the boundless planning literature in an alternative way. This is focused on searching (as rediscovering, re-reading, reframing) for the roots of disciplines from an anti-dogmatic perspective biased toward the future. This p作者: Albumin 時間: 2025-3-23 03:43 作者: 易發(fā)怒 時間: 2025-3-23 05:50 作者: 捕鯨魚叉 時間: 2025-3-23 12:00 作者: Vldl379 時間: 2025-3-23 16:51
Kazuki Yamamura,Yuntao Wang,Eiichiro Fujisakiy ethnography, rhetoric, education, sociology, drama and theatre arts. Relevant to the lives of an emerging generation of researchers and students, this text highlights new methodological pathways that are open to them as they begin their own scholarly undertakings in a rapidly-evolving global resea作者: separate 時間: 2025-3-23 21:43
Oliver Braunsdorf,Stefan Sessinghaus,Julian Horschy ethnography, rhetoric, education, sociology, drama and theatre arts. Relevant to the lives of an emerging generation of researchers and students, this text highlights new methodological pathways that are open to them as they begin their own scholarly undertakings in a rapidly-evolving global resea作者: 數(shù)量 時間: 2025-3-24 00:40
Yongseong Lee,Jinkeon Kang,Donghoon Chang,Seokhie Hongy ethnography, rhetoric, education, sociology, drama and theatre arts. Relevant to the lives of an emerging generation of researchers and students, this text highlights new methodological pathways that are open to them as they begin their own scholarly undertakings in a rapidly-evolving global resea作者: 樂器演奏者 時間: 2025-3-24 04:36
Jonghyun Park,Hangi Kim,Jongsung Kimy ethnography, rhetoric, education, sociology, drama and theatre arts. Relevant to the lives of an emerging generation of researchers and students, this text highlights new methodological pathways that are open to them as they begin their own scholarly undertakings in a rapidly-evolving global resea作者: 沙發(fā) 時間: 2025-3-24 10:21
, and Ian McHarg). The second thread groups the authors who dialogue with contemporary protagonists of the planning debate (including John Friedmann, Leonie Sandercock, Doreen Massey, David Harvey, Tom Sievert,978-3-030-93109-4978-3-030-93107-0Series ISSN 2365-757X Series E-ISSN 2365-7588 作者: 閑聊 時間: 2025-3-24 14:22 作者: Debate 時間: 2025-3-24 16:20
levant to the lives of an emerging generation of researchers and students, this text highlights new methodological pathways that are open to them as they begin their own scholarly undertakings in a rapidly-evolving global resea978-94-6209-755-1作者: 流浪 時間: 2025-3-24 19:53 作者: Nebulous 時間: 2025-3-25 02:11 作者: GROWL 時間: 2025-3-25 04:39
Valeh Farzaliyev,Jan Willemson,Jaan Kristjan Kaasiklevant to the lives of an emerging generation of researchers and students, this text highlights new methodological pathways that are open to them as they begin their own scholarly undertakings in a rapidly-evolving global resea978-94-6209-755-1作者: Ventricle 時間: 2025-3-25 08:22
Peixin Ren,Xiaozhuo Gulevant to the lives of an emerging generation of researchers and students, this text highlights new methodological pathways that are open to them as they begin their own scholarly undertakings in a rapidly-evolving global resea978-94-6209-755-1作者: sigmoid-colon 時間: 2025-3-25 15:04 作者: 無法解釋 時間: 2025-3-25 17:53
Congming Wei,Chenhao Wu,Ximing Fu,Xiaoyang Dong,Kai He,Jue Hong,Xiaoyun Wanglevant to the lives of an emerging generation of researchers and students, this text highlights new methodological pathways that are open to them as they begin their own scholarly undertakings in a rapidly-evolving global resea978-94-6209-755-1作者: jaunty 時間: 2025-3-25 22:10 作者: 有機體 時間: 2025-3-26 02:37
Matthew Beighton,Harry Bartlett,Leonie Simpson,Kenneth Koon-Ho Wonglevant to the lives of an emerging generation of researchers and students, this text highlights new methodological pathways that are open to them as they begin their own scholarly undertakings in a rapidly-evolving global resea978-94-6209-755-1作者: 使乳化 時間: 2025-3-26 05:18 作者: Soliloquy 時間: 2025-3-26 09:14
978-3-031-08895-7The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: Sedative 時間: 2025-3-26 16:00 作者: DAMP 時間: 2025-3-26 17:52 作者: Arresting 時間: 2025-3-26 22:14
Towards Witness Encryption Without Multilinear Mapsoblem. Our construction allows to encrypt for an instance of the subset sum problem (actually, a multidimensional variant of it) for which short solutions to the homogeneous equation are hard to find. Alas, we do not propose any reduction from a known NP-complete problem.作者: Euthyroid 時間: 2025-3-27 03:27 作者: 材料等 時間: 2025-3-27 09:21
Preimage Attacks on?4-Round Keccak by?Solving Multivariate Quadratic Systemss in order to make full use of variables. With the help of solving MQ systems, we successfully improve preimage attacks on Keccak-224/256 reduced to 4 rounds. Moreover, we implement the preimage attack on 4-round Keccak[.], an instance in the Keccak preimage challenges, and find 78-bit matched ..作者: 落葉劑 時間: 2025-3-27 10:50 作者: 遺傳 時間: 2025-3-27 15:39 作者: 女上癮 時間: 2025-3-27 19:24 作者: nutrients 時間: 2025-3-28 01:49
Improved Lattice-Based Mix-Nets for Electronic Votingt-quantum mix-nets featuring more efficient zero-knowledge proofs while maintaining established security assumptions. Our current implementation scales up to 100000 votes, still leaving a lot of room for future optimisation.作者: Lyme-disease 時間: 2025-3-28 04:37
0302-9743 Seoul, South Korea, in December 2021.. The total of 23 papers presented in this volume were carefully reviewed and selected from 63 submissions. The papers are arranged by topic: Cryptographic Protocol in Quantum Computer Age; Security Analysis of Hash Algorithm; Security analysis of Symmetric Key E作者: 傾聽 時間: 2025-3-28 06:55 作者: PURG 時間: 2025-3-28 12:23
0302-9743 as to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptology..978-3-031-08895-7978-3-031-08896-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 直言不諱 時間: 2025-3-28 15:17
Compiler-based Attack Origin Tracking with?Dynamic Taint Analysisracking engine. Our results show that control-flow hijacking attempts can be reliably detected. Compared to previous approaches based on Dynamic Binary Instrumentation, our compiler-based static instrumentation introduces less run-time overhead: on average 3.52x for SPEC CPU2017 benchmarks and 1.56x for the real-world web server NginX.作者: 狂怒 時間: 2025-3-28 22:15 作者: ear-canal 時間: 2025-3-29 02:40 作者: Basal-Ganglia 時間: 2025-3-29 06:05
Designated-Verifier Linkable Ring Signaturesuity and provide the capability to the designated verifier to add ‘noise’ using simulated signatures that are publicly verifiable, thus increasing overall privacy. More formally, we model unforgeability, anonymity, linkability and non-transferability for DVLRS and provide a secure construction in th作者: Negotiate 時間: 2025-3-29 10:37 作者: 顛簸地移動 時間: 2025-3-29 13:18 作者: Tortuous 時間: 2025-3-29 18:48 作者: sacrum 時間: 2025-3-29 21:52 作者: 吸引人的花招 時間: 2025-3-30 03:53
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methodsf lattice algorithms to solve SVP: search algorithms and reduction algorithms. The original enumeration algorithm (ENUM) is one of the former algorithms which run in exponential time due to the exhaustive search. Further, ENUM is used as a subroutine for the BKZ algorithm, which is one of the most p作者: Patrimony 時間: 2025-3-30 05:06
Compiler-based Attack Origin Tracking with?Dynamic Taint Analysisackers. However, most of them only abort the protected application after attack detection, producing no further information for attack analysis. Solely restarting the application leaves it open for repeated attack attempts. We propose ., a compiler-based CFI approach that utilizes dynamic taint anal作者: 平 時間: 2025-3-30 10:24