Inoperable
发表于 2025-3-28 14:53:10
Is what you ask for what you get?,-Levin extractor; these outperform the previous constructions in terms of public-key size and reduction tightness, as well as enjoying CCA security. Finally, we also point out that our approach leads to an elegant construction for Correlation Input Secure hash functions, which have proven to be a versatile tool in diverse areas of cryptography.
无意
发表于 2025-3-28 22:00:30
http://reply.papertrans.cn/25/2406/240574/240574_42.png
不透气
发表于 2025-3-29 02:30:55
Is what you ask for what you get?,es into a protocol secure against malicious adversaries in the LUC framework; (ii) We consider the application of our compiler to oblivious transfer (OT) protocols, by which we obtain a construction of OT meeting both UC security and game-theoretic security.
DAMN
发表于 2025-3-29 07:09:52
Security Against Related Randomness Attacks via Reconstructive Extractors-Levin extractor; these outperform the previous constructions in terms of public-key size and reduction tightness, as well as enjoying CCA security. Finally, we also point out that our approach leads to an elegant construction for Correlation Input Secure hash functions, which have proven to be a versatile tool in diverse areas of cryptography.
byline
发表于 2025-3-29 08:09:56
MI-T-HFE, A New Multivariate Signature Schemeing for a few major signature schemes, including QUARTZ. A practical parameter set is proposed for MI-T-HFE with the same length of message and same level of security as QUARTZ, but it has smaller public key size, and is more efficient than (the underlying HFEv- of) QUARTZ with the only cost that its signature length is twice that of QUARTZ.
要控制
发表于 2025-3-29 14:38:05
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application toes into a protocol secure against malicious adversaries in the LUC framework; (ii) We consider the application of our compiler to oblivious transfer (OT) protocols, by which we obtain a construction of OT meeting both UC security and game-theoretic security.
pacifist
发表于 2025-3-29 18:51:24
http://reply.papertrans.cn/25/2406/240574/240574_47.png
craven
发表于 2025-3-29 22:10:15
http://reply.papertrans.cn/25/2406/240574/240574_48.png
生锈
发表于 2025-3-30 02:25:44
Conference proceedings 2015 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience
同步左右
发表于 2025-3-30 04:51:11
http://reply.papertrans.cn/25/2406/240574/240574_50.png