explicit 发表于 2025-3-30 11:17:46

http://reply.papertrans.cn/15/1475/147489/147489_51.png

notification 发表于 2025-3-30 14:07:41

https://doi.org/10.1007/978-1-4419-8471-5mprovements that accelerate key exchange in this framework, and explore the problem of generating suitable system parameters for contemporary pre- and post-quantum security that take advantage of these new algorithms. We also prove the session-key security of this key exchange in the Canetti–Krawczy

fibroblast 发表于 2025-3-30 18:28:59

https://doi.org/10.1007/978-3-030-03332-3authentication; cryptography; data privacy; data security; elliptic curve; encryption; network security; pr

PHON 发表于 2025-3-30 21:05:54

978-3-030-03331-6International Association for Cryptologic Research 2018

神圣不可 发表于 2025-3-31 01:34:48

http://reply.papertrans.cn/15/1475/147489/147489_55.png

货物 发表于 2025-3-31 07:41:40

Conference proceedings 2018; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations..

舰旗 发表于 2025-3-31 10:42:23

Mode of Societalisation and Consumption Normwhich developed new passively secure MPC protocols in the same context. We further demonstrate the usefulness of this theory in practice by analyzing the concrete communication overhead of our protocols, which improve upon the most efficient previous works.
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Advances in Cryptology – ASIACRYPT 2018; 24th International C Thomas Peyrin,Steven Galbraith Conference proceedings 2018 International Asso