开玩笑 发表于 2025-3-30 09:12:13

Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Ringsedge. Our scheme maps elements from the ring (or equivalently, . elements from .) to a small constant number of ring elements. We then construct .-protocols for proving, in a zero-knowledge manner, knowledge of the message contained in a commitment. We are able to further extend our basic protocol t

visceral-fat 发表于 2025-3-30 13:40:59

http://reply.papertrans.cn/24/2339/233840/233840_52.png

HEDGE 发表于 2025-3-30 19:01:01

The Circular Economy in the European Uniony provider mode of BrowserID. We do not only study authentication properties as before, but also privacy properties. During our analysis we discovered new and practical attacks that do not apply to the secondary mode: an identity injection attack, which violates a central authentication property of

包庇 发表于 2025-3-30 22:45:44

Money Makes the World Go ′round?y operation that can violate the desired security property. The verification of the monitor has been performed using the HOL4 theorem prover and by extending the existing formal model of the hypervisor with the formal specification of the high level model of the monitor.

FEIGN 发表于 2025-3-31 01:13:56

http://reply.papertrans.cn/24/2339/233840/233840_55.png

令人不快 发表于 2025-3-31 09:01:06

http://reply.papertrans.cn/24/2339/233840/233840_56.png

影响深远 发表于 2025-3-31 12:23:43

http://reply.papertrans.cn/24/2339/233840/233840_57.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Computer Security -- ESORICS 2015; 20th European Sympos Günther Pernul,Peter Y A Ryan,Edgar Weippl Conference proceedings 2015 Springer Int