阴谋小团体 发表于 2025-3-28 17:23:45

http://reply.papertrans.cn/15/1476/147537/147537_41.png

瘙痒 发表于 2025-3-28 19:21:56

http://reply.papertrans.cn/15/1476/147537/147537_42.png

确定方向 发表于 2025-3-28 23:13:58

http://reply.papertrans.cn/15/1476/147537/147537_43.png

斗志 发表于 2025-3-29 06:49:46

https://doi.org/10.1007/978-88-470-2139-6hey are also met with some skepticism due to many impossibility results; goals such as commitments and zero-knowledge that are achievable in a stand-alone sense were shown to be unachievable composably (without a setup) since provably no efficient simulator exists. In particular, in the context of a

个阿姨勾引你 发表于 2025-3-29 08:46:00

R. Brugada,J. Brugada,R. Robertsions of public key cryptosystems that are indifferentiable from ideal cryptosystems, in the random oracle model. Cryptosystems include:.Our schemes are based on relatively standard public key assumptions. By being indifferentiable from an ideal object, our schemes automatically satisfy a wide range

Annotate 发表于 2025-3-29 15:09:47

R. F. Guaragna,C. H. Chen,D. Bracchettieal” protocol (say, appearing in a cryptographic standard). It is based on the indifferentiability framework of Maurer, Renner, and Holenstein (MRH), whose application has been exclusively focused upon non-interactive cryptographic primitives, e.g., hash functions and Feistel networks. Our extension

小淡水鱼 发表于 2025-3-29 17:43:19

R. Brugada,J. Brugada,R. Robertsruvengadam (TCC ’18), Jaeger and Tessaro (EUROCRYPT ’19), and Dinur (EUROCRYPT ’20) – focus on confidentiality, and look at schemes for which trade-offs between the attacker’s memory and its data complexity are inherent. Here, we ask whether these results and techniques can be lifted to the full AE

怎样才咆哮 发表于 2025-3-29 19:53:02

http://reply.papertrans.cn/15/1476/147537/147537_48.png

Decibel 发表于 2025-3-30 03:29:58

http://reply.papertrans.cn/15/1476/147537/147537_49.png

激怒 发表于 2025-3-30 07:08:23

https://doi.org/10.1007/978-88-470-2103-7then Cohney et al. (S&P’ 20) point out some potential vulnerabilities in both NIST specification and common implementations of .. While these researchers do suggest counter-measures, the security of the patched . is still questionable. Our work fills this gap, proving that . satisfies the robustness
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Advances in Cryptology – CRYPTO 2020; 40th Annual Internat Daniele Micciancio,Thomas Ristenpart Conference proceedings 2020 International A