malapropism 发表于 2025-3-28 15:03:35

Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks costs. Questions of contract forms and the income of intermediaries are discussed in Section 3.3. The effects of intermediation on markets and the market microstructure of markets for intermediary services are reviewed in Sections 3.4 and 3.5 respectively.

Freeze 发表于 2025-3-28 20:39:14

https://doi.org/10.1007/978-3-319-63688-7data security; network security; authentication; public key cryptography; cryptography; encryption; finite

小官 发表于 2025-3-29 00:15:44

http://reply.papertrans.cn/15/1476/147528/147528_43.png

Integrate 发表于 2025-3-29 05:16:18

Advances in Cryptology – CRYPTO 2017978-3-319-63688-7Series ISSN 0302-9743 Series E-ISSN 1611-3349

GREG 发表于 2025-3-29 07:25:52

http://reply.papertrans.cn/15/1476/147528/147528_45.png

Chagrin 发表于 2025-3-29 14:33:54

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/a/image/147528.jpg

滔滔不绝地说 发表于 2025-3-29 19:08:49

http://reply.papertrans.cn/15/1476/147528/147528_47.png

custody 发表于 2025-3-29 20:11:46

Dinh-Tuan Nguyen,Ya-Ping Hsieh,Mario Hofmannes. We give an algebraic characterization of the notion of privacy from predicate encodings, and explore several of its consequences. Specifically, we propose more efficient predicate encodings for boolean formulae and arithmetic span programs, and generic optimizations of predicate encodings. We de

Institution 发表于 2025-3-30 03:53:26

https://doi.org/10.1007/978-3-319-61651-3ble the computation of so-called . on encrypted vectors. This represents a practically relevant class of functions that includes, for instance, multivariate quadratic polynomials (over the integers). Our realizations work over asymmetric bilinear groups and are surprisingly efficient and easy to imp

Conscientious 发表于 2025-3-30 04:03:31

https://doi.org/10.1007/978-1-4020-2887-8 work we initiate the study of . in reductions. We argue that the amount of working memory used (relative to the initial adversary) is a relevant parameter in reductions, and that reductions that are inefficient with memory will sometimes yield less meaningful security guarantees. We then point to s
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Advances in Cryptology – CRYPTO 2017; 37th Annual Internat Jonathan Katz,Hovav Shacham Conference proceedings 2017 International Associatio