supported by Beijing Natural Science Foundation(No:4232034);the Fundamental Research Funds for the Central Universities(No:328202222).
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate ...
supported by the French ANR project ANR-18-CE39-0019(MobiS5);Other programs also fund to write this paper,namely the French government research program“Investissements d’Avenir”through the IDEX-ISITE initiative 16-IDEX-0001(CAP 20-25);the IMobS3 Laboratory of Excellence(No.ANR-10-LABX-16-01);Finally,the French ANR project DECRYPT(No.ANR-18-CE39-0007);SEVERITAS(No.ANR-20-CE39-0009)also subsidize this work;The first author was supported in part by Kayamori Foundation of Informational Science Advancement and JSPS KAKENHI(No.JP23H00479);The fourth author was supported in part by JSPS KAKENHI(Nos.JP21K11881 and JP23H00479).
A Zero-Knowledge Proof (ZKP) protocol allows a participant to prove the knowledge of some secret without revealing any information about it. While such protocols are typically executed by computers, there exists a lin...
sponsored in part by the National Natural Science Foundation of China[Grant-Nos.61902428,6210071026,62202493].
The computational complexity of privacy information retrieval protocols is often linearly related to database size.When the database size is large,the efficiency of privacy information retrieval protocols is relativel...
National Natural Science Foundation of China(62472397);Innovation Program for Quantum Science and Technology(2021ZD0302902)。
Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend P...
The world’s energy industry is experiencing a significant transformation due to increased energy consumption, the rise in renewable energy usage, and the demand for sustainability. This review paper explores the pote...
supported by Young Elite Scientists Sponsorship Program by China Association for Science and Technology (Grant No.2022QNRC001)。
Access authentication scheme plays a foundational role in ensuring the security of communication networks. However, an access authentication scheme with high security and efficiency is still lacking in quantum communi...
Ransomware has emerged as a critical cybersecurity threat,characterized by its ability to encrypt user data or lock devices,demanding ransom for their release.Traditional ransomware detection methods face limitations ...
supported by the National Natural Science Foundation of China under Grant Nos.62032009 and 62102440。
Random sampling algorithm was proposed firstly by Schnorr in 2003 to find short lattice vectors,as an alternative to enumeration.The follow-up developments in random sampling were mainly proposed by Fukase and Kashiwa...
supported by ZTE IndustryUniversityInstitute Cooperation Funds under Grant No.HCCN20221029003.
Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in ...
The advent of the digital era and computer-based remote communications has significantly enhanced the applicability of various sciences over the past two decades,notably data science(DS)and cryptography(CG).Data scien...