DOSE 发表于 2025-3-23 10:10:33

http://reply.papertrans.cn/15/1477/147606/147606_11.png

CROAK 发表于 2025-3-23 14:43:04

http://reply.papertrans.cn/15/1477/147606/147606_12.png

APNEA 发表于 2025-3-23 19:19:04

Multiparty Computations Ensuring Privacy of Each Party’s Input and Correctness of the Result978-1-4757-0414-3

小争吵 发表于 2025-3-24 00:50:27

http://reply.papertrans.cn/15/1477/147606/147606_14.png

小画像 发表于 2025-3-24 04:59:44

http://reply.papertrans.cn/15/1477/147606/147606_15.png

Cumbersome 发表于 2025-3-24 06:39:35

Key Distribution Systems Based on Identification Information978-981-16-9250-5

CRATE 发表于 2025-3-24 14:26:39

Secret Distribution of Keys for Public-Key Systems978-0-230-23943-2

磨坊 发表于 2025-3-24 18:21:48

Efficient Digital Public-Key Signatures with Shadow978-1-349-26496-4

dominant 发表于 2025-3-24 21:16:01

http://reply.papertrans.cn/15/1477/147606/147606_19.png

连词 发表于 2025-3-25 00:42:30

Carl Benz Gottlieb Daimler Wilhelm Maybachcomputing another particular function ..(·,·). Both works use a . result of Yao in order to implement protocols for the . functions .., and ....In this paper, we present direct solutions to the above two particular protocol problems, avoiding the use of Yao’s general result. In fact. we present two
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Advances in Cryptology - CRYPTO ‘87; Proceedings Carl Pomerance Conference proceedings 1988 Springer-Verlag Berlin Heidelberg 1988 authenti