Mechanics 发表于 2025-3-25 05:47:59

Conference proceedings 2015 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience.

芭蕾舞女演员 发表于 2025-3-25 08:01:57

http://reply.papertrans.cn/25/2406/240574/240574_22.png

原始 发表于 2025-3-25 14:40:25

http://reply.papertrans.cn/25/2406/240574/240574_23.png

得意人 发表于 2025-3-25 19:48:17

http://reply.papertrans.cn/25/2406/240574/240574_24.png

Fallibility 发表于 2025-3-25 22:30:57

http://reply.papertrans.cn/25/2406/240574/240574_25.png

eczema 发表于 2025-3-26 02:42:56

http://reply.papertrans.cn/25/2406/240574/240574_26.png

INTER 发表于 2025-3-26 06:57:22

http://reply.papertrans.cn/25/2406/240574/240574_27.png

享乐主义者 发表于 2025-3-26 08:31:18

Robust Authenticated Encryption and the Limits of Symmetric Cryptography longer the ciphertext is compared to the plaintext. For every ciphertext expansion, RAE aims at providing the best-possible authenticity and confidentiality. To investigate whether this is actually achieved, we characterize exactly the guarantees symmetric cryptography can provide for any given cip

会犯错误 发表于 2025-3-26 14:56:25

A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to game-theoretic security? In order to discuss the composability of game-theoretic properties, we study security of cryptographic protocols in terms of the universal composability (UC) and game theory simultaneously. The contribution of this paper is the following: (i) We propose a compiler of two-pa

敲诈 发表于 2025-3-26 16:58:52

http://reply.papertrans.cn/25/2406/240574/240574_30.png
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Cryptography and Coding; 15th IMA Internation Jens Groth Conference proceedings 2015 Springer International Publishing Switzerland 2015 Aut