Denial 发表于 2025-3-21 19:40:26

书目名称Advances in Cryptology - ASIACRYPT 2010影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0147457<br><br>        <br><br>书目名称Advances in Cryptology - ASIACRYPT 2010影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0147457<br><br>        <br><br>书目名称Advances in Cryptology - ASIACRYPT 2010网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0147457<br><br>        <br><br>书目名称Advances in Cryptology - ASIACRYPT 2010网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0147457<br><br>        <br><br>书目名称Advances in Cryptology - ASIACRYPT 2010被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0147457<br><br>        <br><br>书目名称Advances in Cryptology - ASIACRYPT 2010被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0147457<br><br>        <br><br>书目名称Advances in Cryptology - ASIACRYPT 2010年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0147457<br><br>        <br><br>书目名称Advances in Cryptology - ASIACRYPT 2010年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0147457<br><br>        <br><br>书目名称Advances in Cryptology - ASIACRYPT 2010读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0147457<br><br>        <br><br>书目名称Advances in Cryptology - ASIACRYPT 2010读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0147457<br><br>        <br><br>

albuminuria 发表于 2025-3-21 22:52:33

http://reply.papertrans.cn/15/1475/147457/147457_2.png

detach 发表于 2025-3-22 01:03:49

http://reply.papertrans.cn/15/1475/147457/147457_3.png

MEET 发表于 2025-3-22 06:44:56

H. Riehm,H.-J. Feickert,F. Lampertmming distance less than some threshold ((.(.) communication in .(1) rounds). The length, ., of Bob’s pattern is secret (.(.) communication in .(1) rounds). The length, ., of Alice’s text is secret (.(. + .) communication in .(1) rounds).

malign 发表于 2025-3-22 12:01:23

http://reply.papertrans.cn/15/1475/147457/147457_5.png

酷热 发表于 2025-3-22 15:00:09

http://reply.papertrans.cn/15/1475/147457/147457_6.png

惊惶 发表于 2025-3-22 20:41:31

https://doi.org/10.1007/978-3-642-84722-6256 compression function. The pseudo preimage algorithm can be used to find second preimages of the digests of messages . with complexity 2., which is lower than the best generic attacks when . is short.

Charade 发表于 2025-3-23 01:08:52

http://reply.papertrans.cn/15/1475/147457/147457_8.png

GUILE 发表于 2025-3-23 01:42:14

http://reply.papertrans.cn/15/1475/147457/147457_9.png

BADGE 发表于 2025-3-23 07:31:03

https://doi.org/10.1007/978-3-319-52554-9 malicious model under standard cryptographic assumptions, with both . communication and computational complexities. To the best of our knowledge, our APSI is the first solution to do so. Finally, we show that our linear PSI is appreciably more efficient than the state-of-the-art.
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Advances in Cryptology - ASIACRYPT 2010; 16th International C Masayuki Abe Conference proceedings 2010 International Association for Crypto