Oratory 发表于 2025-3-28 16:34:28

http://reply.papertrans.cn/16/1598/159739/159739_41.png

osteoclasts 发表于 2025-3-28 19:43:02

http://reply.papertrans.cn/16/1598/159739/159739_42.png

BARK 发表于 2025-3-29 02:05:50

https://doi.org/10.1007/978-3-7643-8166-0 coinciding with takedowns of known dark web markets. We also found interesting behavior that distinguishes the Bitcoin addresses collected from the dark web when compared to activity of a random address on the Bitcoin blockchain. For example, we found that Bitcoin addresses used on the dark web are

MANIA 发表于 2025-3-29 03:52:08

http://reply.papertrans.cn/16/1598/159739/159739_44.png

坚毅 发表于 2025-3-29 11:06:04

Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signaturesrity relies on “post-quantum” lattice assumptions. Even for a very large ring size such as 1 billion, our ring signature size is only 3 MB for 128-bit security level compared to 216 MB in the best existing lattice-based result by Libert et al. (EUROCRYPT ’16).

Libido 发表于 2025-3-29 13:44:03

http://reply.papertrans.cn/16/1598/159739/159739_46.png

尾巴 发表于 2025-3-29 18:45:44

http://reply.papertrans.cn/16/1598/159739/159739_47.png

赏钱 发表于 2025-3-29 23:04:56

http://reply.papertrans.cn/16/1598/159739/159739_48.png

Mercurial 发表于 2025-3-30 01:05:33

http://reply.papertrans.cn/16/1598/159739/159739_49.png

ectropion 发表于 2025-3-30 06:15:37

Longitudinal Analysis of Misuse of Bitcoin coinciding with takedowns of known dark web markets. We also found interesting behavior that distinguishes the Bitcoin addresses collected from the dark web when compared to activity of a random address on the Bitcoin blockchain. For example, we found that Bitcoin addresses used on the dark web are
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Applied Cryptography and Network Security; 17th International C Robert H. Deng,Valérie Gauthier-Umaña,Moti Yung Conference proceedings 2019