Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization Process
NIST is in the process of evaluating public-key digital signature algorithms for potential
standardization to protect sensitive information into the foreseeable future, including after the …
standardization to protect sensitive information into the foreseeable future, including after the …
Ab-pake: Achieving fine-grained access control and flexible authentication
M Song, D Wang - IEEE Transactions on Information Forensics …, 2024 - ieeexplore.ieee.org
Two-factor authentication provides a strong defense against account compromise. However,
traditional two-factor authentication schemes cannot provide users with much flexibility and …
traditional two-factor authentication schemes cannot provide users with much flexibility and …
Carry your fault: a fault propagation attack on side-channel protected LWE-based KEM
Post-quantum cryptographic (PQC) algorithms, especially those based on the learning with
errors (LWE) problem, have been subjected to several physical attacks in the recent past …
errors (LWE) problem, have been subjected to several physical attacks in the recent past …
Post-quantum signatures in DNSSEC via request-based fragmentation
Abstract The Domain Name System Security Extensions (DNSSEC) provide authentication
of DNS responses using digital signatures. DNS operates primarily over UDP, which leads …
of DNS responses using digital signatures. DNS operates primarily over UDP, which leads …
A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer
Physical attacks are serious threats to cryptosystems deployed in the real world. In this work,
we propose a microarchitectural end-to-end attack methodology on generic lattice-based …
we propose a microarchitectural end-to-end attack methodology on generic lattice-based …
Impeccable Keccak: Towards Fault Resilient SPHINCS+ Implementations
I Gavrilan, F Oberhansl, A Wagner… - IACR Transactions …, 2024 - ojs.ub.ruhr-uni-bochum.de
The standardization of the hash-based digital signature scheme SPHINCS+ proceeds faster
than initially expected. This development seems to be welcomed by practitioners who …
than initially expected. This development seems to be welcomed by practitioners who …
CryptAttackTester: high-assurance attack analysis
Quantitative analyses of the costs of cryptographic attack algorithms play a central role in
comparing cryptosystems, guiding the search for improved attacks, and deciding which …
comparing cryptosystems, guiding the search for improved attacks, and deciding which …
Quantum-resistant MACsec and IPsec for virtual private networks
SL Gazdag, S Grundner-Culemann, T Heider… - … on Research in Security …, 2023 - Springer
Despite considerable progress in theoretical post-quantum cryptography we have yet to see
significant advances in its practical adoption. The necessary protocol modifications need to …
significant advances in its practical adoption. The necessary protocol modifications need to …
Scabbard: An exploratory study on hardware aware design choices of learning with rounding-based key encapsulation mechanisms
Recently, the construction of cryptographic schemes based on hard lattice problems has
gained immense popularity. Apart from being quantum resistant, lattice-based cryptography …
gained immense popularity. Apart from being quantum resistant, lattice-based cryptography …
Hardware acceleration of NTT-based polynomial multiplication in CRYSTALS-KYBER
H Yang, R Chen, Q Wang, Z Wu, W Peng - International Conference on …, 2023 - Springer
CRYSTALS-Kyber is a promising post-quantum encryption candidate and has been
selected for standardization. However, its operational efficiency faces challenges due to …
selected for standardization. However, its operational efficiency faces challenges due to …