Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
State of the art in lightweight symmetric cryptography
Lightweight cryptography has been one of the" hot topics" in symmetric cryptography in the
recent years. A huge number of lightweight algorithms have been published, standardized …
recent years. A huge number of lightweight algorithms have been published, standardized …
Hashing techniques: A survey and taxonomy
With the rapid development of information storage and networking technologies, quintillion
bytes of data are generated every day from social networks, business transactions, sensors …
bytes of data are generated every day from social networks, business transactions, sensors …
[PDF][PDF] A decentralized blockchain with high throughput and fast confirmation
This paper presents Conflux, a scalable and decentralized blockchain system with high
throughput and fast confirmation. Conflux operates with a novel consensus protocol which …
throughput and fast confirmation. Conflux operates with a novel consensus protocol which …
SPHINCS: practical stateless hash-based signatures
This paper introduces a high-security post-quantum stateless hash-based signature scheme
that signs hundreds of messages per second on a modern 4-core 3.5 GHz Intel CPU …
that signs hundreds of messages per second on a modern 4-core 3.5 GHz Intel CPU …
CSI: Rowhammer–Cryptographic security and integrity against rowhammer
In this paper, we present CSI: Rowhammer, a principled hardware-software co-design
Rowhammer mitigation with cryptographic security and integrity guarantees, that does not …
Rowhammer mitigation with cryptographic security and integrity guarantees, that does not …
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …
The complete guide to scion
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
Machine learning-assisted differential distinguishers for lightweight ciphers
A Baksi, A Baksi - Classical and Physical Security of Symmetric Key …, 2022 - Springer
At CRYPTO'19, Gohr first introduces the deep learning-based cryptanalysis on round-
reduced SPECK. Using a deep residual network, Gohr trains several neural network-based …
reduced SPECK. Using a deep residual network, Gohr trains several neural network-based …
Pacmem: Enforcing spatial and temporal memory safety via arm pointer authentication
Memory safety is a key security property that stops memory corruption vulnerabilities.
Different types of memory safety enforcement solutions have been proposed and adopted by …
Different types of memory safety enforcement solutions have been proposed and adopted by …
A survey of network-on-chip security attacks and countermeasures
With the advances of chip manufacturing technologies, computer architects have been able
to integrate an increasing number of processors and other heterogeneous components on …
to integrate an increasing number of processors and other heterogeneous components on …