標(biāo)題: Titlebook: Selected Areas in Cryptography -- SAC 2013; 20th International C Tanja Lange,Kristin Lauter,Petr Lisoněk Conference proceedings 2014 Spring [打印本頁] 作者: Enlightening 時(shí)間: 2025-3-21 17:29
書目名稱Selected Areas in Cryptography -- SAC 2013影響因子(影響力)
書目名稱Selected Areas in Cryptography -- SAC 2013影響因子(影響力)學(xué)科排名
書目名稱Selected Areas in Cryptography -- SAC 2013網(wǎng)絡(luò)公開度
書目名稱Selected Areas in Cryptography -- SAC 2013網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Selected Areas in Cryptography -- SAC 2013被引頻次
書目名稱Selected Areas in Cryptography -- SAC 2013被引頻次學(xué)科排名
書目名稱Selected Areas in Cryptography -- SAC 2013年度引用
書目名稱Selected Areas in Cryptography -- SAC 2013年度引用學(xué)科排名
書目名稱Selected Areas in Cryptography -- SAC 2013讀者反饋
書目名稱Selected Areas in Cryptography -- SAC 2013讀者反饋學(xué)科排名
作者: cleaver 時(shí)間: 2025-3-21 23:11 作者: sphincter 時(shí)間: 2025-3-22 02:39
Diego F. Aranha,Paulo S. L. M. Barreto,Patrick Longa,Jefferson E. Ricardinize LabVIEW and the NI-SPEEDY-33 hardware to explore concepts such as basic computer input and output, basic robotic principals, and introductory signal processing and communication concepts such as signal generation, modulation, music, speech, and audio and image/video processing. These principals a作者: 軍火 時(shí)間: 2025-3-22 07:34
ze LabVIEW and the NI-SPEEDY-33 hardware to explore concepts such as basic computer input and output, basic robotic principals, and introductory signal processing and communication concepts such as signal generation, modulation, music, speech, and audio and image/video processing. These principals a作者: Blanch 時(shí)間: 2025-3-22 11:11
Feng Zhang,Yanbin Pan,Gengran Huze LabVIEW and the NI-SPEEDY-33 hardware to explore concepts such as basic computer input and output, basic robotic principals, and introductory signal processing and communication concepts such as signal generation, modulation, music, speech, and audio and image/video processing. These principals a作者: 整體 時(shí)間: 2025-3-22 15:44
Rachid El Bansarkhani,Johannes Buchmannze LabVIEW and the NI-SPEEDY-33 hardware to explore concepts such as basic computer input and output, basic robotic principals, and introductory signal processing and communication concepts such as signal generation, modulation, music, speech, and audio and image/video processing. These principals a作者: 貧窮地活 時(shí)間: 2025-3-22 17:42
Thomas P?ppelmann,Tim Güneysuze LabVIEW and the NI-SPEEDY-33 hardware to explore concepts such as basic computer input and output, basic robotic principals, and introductory signal processing and communication concepts such as signal generation, modulation, music, speech, and audio and image/video processing. These principals a作者: Agronomy 時(shí)間: 2025-3-22 21:37
and undergraduates on Electromagnetics as well as to select.This text provides students with the missing link that can help them master the basic principles of electromagnetics. The concept of vector fields is introduced by starting with clear definitions of position, distance, and base vectors. Th作者: agnostic 時(shí)間: 2025-3-23 02:03
Jung Hee Cheon,Taechan Kim,Yong Soo Song introduced by starting with clear definitions of position, distance, and base vectors. The symmetries of typical configurations are discussed in detail, including cylindrical, spherical, translational, and two-fold rotational symmetries. To avoid serious confusion between symbols with two indices, 作者: faculty 時(shí)間: 2025-3-23 06:57 作者: Lime石灰 時(shí)間: 2025-3-23 11:24
res of iron were reduced to the metal using charcoal as a reducing agent, and steel, which is basically an alloy of iron and carbon, was produced by the . process, in which wrought iron bars were packed, together with charcoal, in cast iron boxes and heated to about 1000°C. At the high temperature c作者: 無畏 時(shí)間: 2025-3-23 15:07 作者: 拱形面包 時(shí)間: 2025-3-23 22:03
Dmitry Khovratovich,Christian Rechbergerres of iron were reduced to the metal using charcoal as a reducing agent, and steel, which is basically an alloy of iron and carbon, was produced by the . process, in which wrought iron bars were packed, together with charcoal, in cast iron boxes and heated to about 1000°C. At the high temperature c作者: 合唱團(tuán) 時(shí)間: 2025-3-24 02:12
Hongjun Wu,Bart Preneelrmer category covers the element iron and its alloys, while all the other metallic elements (some 70 in number) and their alloys are classified as non-ferrous. The division is not quite as unbalanced as might at first appear, because iron occupies a very special position among metallic materials, ow作者: 牌帶來 時(shí)間: 2025-3-24 04:38 作者: Adenoma 時(shí)間: 2025-3-24 07:07
Charles Bouillaguet,Chen-Mou Cheng,Tung Chou,Ruben Niederhagen,Bo-Yin Yanghat control the properties of materials. There are many thousands of materials available for use by today’s engineers and, clearly, it is impossible for one person to have a full and detailed knowledge of all of them. However, as we have seen in Chapter 1, materials can be classified within several 作者: 星星 時(shí)間: 2025-3-24 13:42
Thomas Eisenbarth,Ingo von Maurich,Xin Yeres of iron were reduced to the metal using charcoal as a reducing agent, and steel, which is basically an alloy of iron and carbon, was produced by the . process, in which wrought iron bars were packed, together with charcoal, in cast iron boxes and heated to about 1000°C. At the high temperature c作者: 群居男女 時(shí)間: 2025-3-24 17:04
The Realm of the Pairingsseful tool for the construction of cryptosystems with unique features. Yet, they are notoriously hard to implement efficiently, so that their effective deployment requires a careful choice of parameters and algorithms. In this paper we review the evolution of pairing-based cryptosystems, the develop作者: 發(fā)酵劑 時(shí)間: 2025-3-24 21:27
A Three-Level Sieve Algorithm for the Shortest Vector Problemieve algorithm. Inspired by their idea, we present a three-level sieve algorithm in this paper, which is shown to have better time complexity. More precisely, the time complexity of our algorithm is . polynomial-time operations and the corresponding space complexity is . polynomially many bits.作者: ticlopidine 時(shí)間: 2025-3-25 02:35
Improvement and Efficient Implementation of a Lattice-Based Signature Schemeure, for example due to the possibility of quantum attacks. A particularly interesting scheme in this context is the GPV signature scheme?[.] combined with the trapdoor construction from Micciancio and Peikert?[.] as it admits strong security proofs and is believed to be very efficient in practice. 作者: 平項(xiàng)山 時(shí)間: 2025-3-25 07:08
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardwareo far it is known for solid security reductions but implementations of specific instances have often been reported to be too complex beyond any practicability. In this work, we present an efficient and scalable micro-code engine for Ring-LWE encryption that combines polynomial multiplication based o作者: glucagon 時(shí)間: 2025-3-25 10:07
Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemesnsor network. Such schemes often inherently suit networks in which the number of nodes belongs to some restricted set of values (such as powers of primes). In a recent paper, Bose, Dey and Mukerjee have suggested that this might pose a problem, since discarding keyrings to suit a smaller network mig作者: 連累 時(shí)間: 2025-3-25 14:04
A Group Action on , and the Generalized DLP with Auxiliary Inputsor of a group of order .. In this paper, we introduce a generalized version of this problem, so called the generalized DLPwAI?(GDLPwAI) problem which is asked to compute . for given ., and propose an efficient algorithm when . is a multiplicative subgroup of .. Although the previous algorithms can o作者: RACE 時(shí)間: 2025-3-25 17:16 作者: 不幸的人 時(shí)間: 2025-3-25 23:07
How to Recover Any Byte of Plaintext on RC4ferent user keys. Their attack is able to recover first 1000 terabytes of a plaintext with probability of almost one, given . ciphertexts encrypted by different keys. Since their attack essentially exploits biases in the initial (1st to 257th) bytes of the keystream, it does not work any more if suc作者: 斗爭 時(shí)間: 2025-3-26 00:59
The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE same number of authentication attempts. We use a differential attack based on a local collision, which exploits the availability of extracted state bytes to the adversary. Our approach allows for a time-data complexity tradeoff, with an extreme case of a forgery produced after . attempts and based 作者: DOLT 時(shí)間: 2025-3-26 06:25
AEGIS: A Fast Authenticated Encryption Algorithmtable for protecting network packets. AEGIS-128 uses five AES round functions to process a 16-byte message block (one step); AES-256 uses six AES round functions. The security analysis shows that both algorithms offer a high level of security. On the Intel Sandy Bridge Core i5 processor, the speed o作者: 詞匯表 時(shí)間: 2025-3-26 10:49
Fast Exhaustive Search for Quadratic Systems in , on FPGAss in 48 variables can be solved on a graphics processing unit (GPU) in 21?min. The research question that we would like to answer in this paper is how specifically designed hardware performs on this task. We approach the answer by solving multivariate quadratic systems on reconfigurable hardware, na作者: 注入 時(shí)間: 2025-3-26 15:01 作者: compel 時(shí)間: 2025-3-26 17:32 作者: 預(yù)測 時(shí)間: 2025-3-26 23:34
A Group Action on , and the Generalized DLP with Auxiliary Inputsnly compute . when . has a small divisor ., our algorithm resolves the problem when neither . or . has an appropriate small divisor. Our method exploits a group action of . on . to partition . efficiently.作者: 消毒 時(shí)間: 2025-3-27 01:24
Solving a ,-bit DLP on a Desktop Computersized finite field of . elements, using just a single core-month. Relative to the previous record set by Joux in the field of . elements, this represents a . increase in the bitlength, using just . of the core-hours. We also show that for the fields considered, the parameters for Joux’s . algorithm may be optimised to produce an . algorithm.作者: 小故事 時(shí)間: 2025-3-27 06:41 作者: 空氣傳播 時(shí)間: 2025-3-27 11:40 作者: Axon895 時(shí)間: 2025-3-27 15:29
0302-9743 d system solving); white box crypto; block ciphers; elliptic curves, pairings and RSA; hash functions and MACs; and side-channel attacks. The book also contains 3 full-length invited talks.978-3-662-43413-0978-3-662-43414-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: JAUNT 時(shí)間: 2025-3-27 20:46 作者: conjunctiva 時(shí)間: 2025-3-28 00:48
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardwaredditionally, we provide solutions for several practical issues with Ring-LWE encryption, including the reduction of ciphertext expansion, error rate and constant-time operation. We hope that this contribution helps to pave the way for the deployment of ideal lattice-based encryption in future real-world systems.作者: 名字的誤用 時(shí)間: 2025-3-28 02:42
Fast Exhaustive Search for Quadratic Systems in , on FPGAstimes less energy than its GPU counterpart. This is a significant improvement, not to mention that the monetary cost per unit of computational power for FPGAs is generally much cheaper than that of GPUs.作者: 作繭自縛 時(shí)間: 2025-3-28 10:09
Faster Hash-Based Signatures with Bounded Leakagecarefully optimized versions for the respective target platform. The theoretical algorithmic improvements are verified in the implementations and cryptographic hardware accelerators are used to achieve competitive performance.作者: HEPA-filter 時(shí)間: 2025-3-28 14:01 作者: Consequence 時(shí)間: 2025-3-28 14:48
0302-9743 y, SAC 2013, held in Burnaby, Canada, in August 2013. The 26 papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: lattices; discrete logarithms; stream ciphers and authenticated encryption; post-quantum (hash-based an作者: Tincture 時(shí)間: 2025-3-28 20:22 作者: STANT 時(shí)間: 2025-3-28 23:14 作者: fibula 時(shí)間: 2025-3-29 05:44 作者: Transfusion 時(shí)間: 2025-3-29 08:42 作者: 墊子 時(shí)間: 2025-3-29 12:04 作者: atrophy 時(shí)間: 2025-3-29 17:35
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/s/image/864144.jpg