Inflated 发表于 2025-3-26 23:53:35

CryptoZoo: A Viewer for Reduction Proofs studies: The equivalence between simulation-based and game-based notions for symmetric encryption, the security proof of the Goldreich-Goldwasser-Micali construction of a pseudorandom function from a pseudorandom generator, and Brzuska’s and Oechsner’s SSP formalization of the proof for Yao’s garbl

Arroyo 发表于 2025-3-27 04:48:56

http://reply.papertrans.cn/16/1598/159730/159730_32.png

清醒 发表于 2025-3-27 09:12:23

A New Approach to Efficient and Secure Fixed-Point Computatione used to realize highly efficient secure fixed-point computation. In contrast to previous approaches, our protocol does not require any multiplications of secret values in the underlying MPC scheme to realize truncation but instead relies on preprocessed pairs of correlated random values, which we

Thrombolysis 发表于 2025-3-27 13:17:30

http://reply.papertrans.cn/16/1598/159730/159730_34.png

炼油厂 发表于 2025-3-27 17:20:15

Verification Protocol for Stable Matching from Conditional Disclosure of Secrets protocol for stable matching against a malicious server. Our verification protocol is constructed from CDS schemes for stable matching, which do not require any asymmetric-key cryptographic primitives. From the implementation result, our proposed protocol is 4 to 5 orders of magnitude faster than t

CAMP 发表于 2025-3-27 19:59:35

http://reply.papertrans.cn/16/1598/159730/159730_36.png

Freeze 发表于 2025-3-28 00:12:37

http://reply.papertrans.cn/16/1598/159730/159730_37.png

符合规定 发表于 2025-3-28 04:46:48

http://reply.papertrans.cn/16/1598/159730/159730_38.png

出血 发表于 2025-3-28 07:32:16

http://reply.papertrans.cn/16/1598/159730/159730_39.png

Asymptomatic 发表于 2025-3-28 10:45:39

http://reply.papertrans.cn/16/1598/159730/159730_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Applied Cryptography and Network Security; 22nd International C Christina Pöpper,Lejla Batina Conference proceedings 2024 The Editor(s) (if