搜索结果: 1-2 共查到“军事学 constrained implementation”相关记录2条 . 查询时间(0.156 秒)
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform
Post-Quantum Cryptography Lattice-based Encryption Scheme Java Card
2019/1/2
Memory-constrained devices, including widely used smart cards, require resisting attacks by the quantum computers. Lattice-based encryption scheme possesses high efficiency and reliability which could...
On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards
Authentication protocol constrained device constrained implementation
2016/1/8
Most lattice-based cryptographic schemes with a security proof suffer from large key
sizes and heavy computations. This is also true for the simpler case of authentication protocols
which are used o...