Inoperable 发表于 2025-3-28 14:53:10

Is what you ask for what you get?,-Levin extractor; these outperform the previous constructions in terms of public-key size and reduction tightness, as well as enjoying CCA security. Finally, we also point out that our approach leads to an elegant construction for Correlation Input Secure hash functions, which have proven to be a versatile tool in diverse areas of cryptography.

无意 发表于 2025-3-28 22:00:30

http://reply.papertrans.cn/25/2406/240574/240574_42.png

不透气 发表于 2025-3-29 02:30:55

Is what you ask for what you get?,es into a protocol secure against malicious adversaries in the LUC framework; (ii) We consider the application of our compiler to oblivious transfer (OT) protocols, by which we obtain a construction of OT meeting both UC security and game-theoretic security.

DAMN 发表于 2025-3-29 07:09:52

Security Against Related Randomness Attacks via Reconstructive Extractors-Levin extractor; these outperform the previous constructions in terms of public-key size and reduction tightness, as well as enjoying CCA security. Finally, we also point out that our approach leads to an elegant construction for Correlation Input Secure hash functions, which have proven to be a versatile tool in diverse areas of cryptography.

byline 发表于 2025-3-29 08:09:56

MI-T-HFE, A New Multivariate Signature Schemeing for a few major signature schemes, including QUARTZ. A practical parameter set is proposed for MI-T-HFE with the same length of message and same level of security as QUARTZ, but it has smaller public key size, and is more efficient than (the underlying HFEv- of) QUARTZ with the only cost that its signature length is twice that of QUARTZ.

要控制 发表于 2025-3-29 14:38:05

A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application toes into a protocol secure against malicious adversaries in the LUC framework; (ii) We consider the application of our compiler to oblivious transfer (OT) protocols, by which we obtain a construction of OT meeting both UC security and game-theoretic security.

pacifist 发表于 2025-3-29 18:51:24

http://reply.papertrans.cn/25/2406/240574/240574_47.png

craven 发表于 2025-3-29 22:10:15

http://reply.papertrans.cn/25/2406/240574/240574_48.png

生锈 发表于 2025-3-30 02:25:44

Conference proceedings 2015 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience

同步左右 发表于 2025-3-30 04:51:11

http://reply.papertrans.cn/25/2406/240574/240574_50.png
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Cryptography and Coding; 15th IMA Internation Jens Groth Conference proceedings 2015 Springer International Publishing Switzerland 2015 Aut