GROVE 发表于 2025-3-26 21:46:50
http://reply.papertrans.cn/103/10287/1028649/1028649_31.pngURN 发表于 2025-3-27 04:35:10
Tackling Adaptive Corruptions in Multicast Encryption Protocolsiques (like non-committing encryption)..We apply our soundness theorem to the security analysis of multicast encryption protocols and show that a variant of the Logical Key Hierarchy (LKH) protocol is adaptively secure (its security being quasi-polynomially related to the security of the underlying encryption scheme).semble 发表于 2025-3-27 07:13:42
Inverse Problems of Wave Propagation and DiffractionProceedings of the CMedicare 发表于 2025-3-27 10:40:23
http://reply.papertrans.cn/103/10287/1028649/1028649_34.pngVICT 发表于 2025-3-27 17:28:32
http://reply.papertrans.cn/103/10287/1028649/1028649_35.png