为了提供给您更好的使用体验,请启用此功能。';window.onload=function(){1==navigator.cookieEnabled||(document.body.insertAdjacentHTML("beforeend",ck_html),window.onscroll=function(i){console.log(i),document.body.setAttribute("style","position:fixed")})}
1. Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-Based Attacks NSTL国家科技图书文献中心
Yiming Gao | Jinghui Wang... - 《Advances in Cryptology - ASIACRYPT 2024,Part VIII》 - International Conference on the Theory and Application of Cryptology and Information Security - 2025, - 3~34 - 共32页
2. Enabling a Smooth Migration Towards Post-Quantum Security for Ethereum NSTL国家科技图书文献中心
Xinxin Fan | Teik Guan Tan... - 《Blockchain - ICBC 2024》 - International Conference on Blockchain | Services Conference Federation - 2025, - 3~15 - 共13页
3. Post-Quantum DNSSEC with Faster TCP Fallbacks NSTL国家科技图书文献中心
Aditya Singh Rawat | Mahabir Prasad Jhanw... - 《Progress in Cryptology - INDOCRYPT 2024,Part II》 - International Conference on Cryptology in India - 2025, - 212~236 - 共25页
4. Efficient Secure Two Party ECDSA NSTL国家科技图书文献中心
Sermin Kocaman | Younes Talibi Alaoui - 《Cryptography and Coding: 19th IMA International Conference, IMACC 2023, London, UK, December 12-14, 2023, Proceedings》 - IMA International Conference on Cryptography and Coding - 2024, - 161~180 - 共20页
5. Extremely Simple Fail-Stop ECDSA Signatures NSTL国家科技图书文献中心
Mario Yaksetig - 《Applied Cryptography and Network Security Workshops: ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II》 - International Conference on Applied Cryptography and Network Security - 2024, - 230~234 - 共5页
6. Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages NSTL国家科技图书文献中心
Shunsuke Osaki | Noboru Kunihiro - 《Information Security and Cryptology: ICISC 2023: 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part I》 - International Conference on Information Security and Cryptology - 2024, - 163~184 - 共22页
7. Comparison of ECDSA Signature Verification Implementations on Bare-Metal Embedded Systems NSTL国家科技图书文献中心
Philipp Holzer | Franz Leopold Wiesin...... - 《36th European Modeling and Simulation Symposium》 - International Multidisciplinary Modeling and Simulation Multiconference | European Modeling and Simulation Symposium - 2024, - 37~43 - 共7页
8. Threshold ECDSA in Three Rounds NSTL国家科技图书文献中心
Jack Doerner | Yashvanth Kondi... - 《2024 IEEE Symposium on Security and Privacy: SP 2024, San Francisco, California, USA, 20-23 May 2024, [v.1]》 - IEEE Symposium on Security and Privacy - 2024, - 3053~3071 - 共19页
9. Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA NSTL国家科技图书文献中心
Jialiu Cheng | Yi Wang... - 《Information Security and Privacy: 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part II》 - Australasian Conference on Information Security and Privacy - 2024, - 370~390 - 共21页
10. Securing Roadside Sensor Networks for Smart Driving Collaboration using ECDSA NSTL国家科技图书文献中心
Visvesvaran C | Karthikeyan N K... - 《2024 5th International Conference on Electronics and Sustainable Communication Systems》 - International Conference on Electronics and Sustainable Communication Systems - 2024, - 791~796 - 共6页
服务站
成员单位
友情链接