GENRE 发表于 2025-3-28 15:18:36

http://reply.papertrans.cn/25/2406/240565/240565_41.png

胆大 发表于 2025-3-28 19:01:31

http://reply.papertrans.cn/25/2406/240565/240565_42.png

mosque 发表于 2025-3-29 02:46:18

http://reply.papertrans.cn/25/2406/240565/240565_43.png

Mundane 发表于 2025-3-29 04:20:46

On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryptionermediary step in the construction. Finally we show that RFEs constructed in this way can be used to construct FHE schemes thereby establishing a relation between the FHE and FE primitives. We conclude the paper by recasting the construction of RFE schemes in the context of obfuscation.

phytochemicals 发表于 2025-3-29 11:17:26

http://reply.papertrans.cn/25/2406/240565/240565_45.png

吹牛大王 发表于 2025-3-29 12:04:00

Secure Key Management in the Cloudds without communicating with anyone from outside the cloud, and . servers that need a limited kind of assistance from outside the cloud when doing the transition. We study the levels of security one can – and cannot – obtain in this model, propose light-weight protocols achieving maximal security, and report on their practical performance.

ornithology 发表于 2025-3-29 16:52:58

Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryptionur generic constructions are simple and quite different from the existing constructions of signcryption, and ours are based on the elegant known techniques for constructing strongly secure public-key encryption from identity-based encryption.

grandiose 发表于 2025-3-29 19:46:58

On Minimal and Quasi-minimal Linear Codesof minimal linear codes. We also introduce and study the notion of quasi-minimal linear codes, which is a relaxation of the notion of minimal linear codes, where two non-zero codewords have the same support if and only if they are linearly dependent.

mortuary 发表于 2025-3-30 02:46:39

Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesiization Hypothesis is not entirely valid for attacks on reduced-round Serpent which rely on linear cryptanalysis or a variant thereof, and survey the effects of this on existing attacks (including existing nonlinear attacks) on 11 and 12-round Serpent.

Cosmopolitan 发表于 2025-3-30 04:31:19

http://reply.papertrans.cn/25/2406/240565/240565_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Cryptography and Coding; 14th IMA Internation Martijn Stam Conference proceedings 2013 Springer-Verlag Berlin Heidelberg 2013 cloud cryptog