flamboyant 发表于 2025-3-28 18:07:28

http://reply.papertrans.cn/25/2407/240601/240601_41.png

sorbitol 发表于 2025-3-28 20:27:58

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/240601.jpg

harbinger 发表于 2025-3-29 01:33:05

Bootstrappable Identity-Based Fully Homomorphic Encryption,-based setting. Our attribute-based scheme is the first to support homomorphic evaluation on ciphertexts with different attributes. Finally, we characterize presently-known leveled IBFHE schemes with a view to developing a “compiler” from a leveled IBFHE scheme to a bootstrappable IBFHE scheme, and

abnegate 发表于 2025-3-29 05:17:45

FFT Key Recovery for Integral Attack,ks against ., CLEFIA, and AES. As a result, 8-round .. can be attacked with about an approximate time complexity of 2.. Moreover, a 6-round AES and 12-round CLEFIA can be attacked with approximate time complexities of 2. and 2., respectively.

斜谷 发表于 2025-3-29 09:57:04

Negotiating DNSSEC Algorithms over Legacy Proxies,also larger than alternatives; the likely reason is lack of negotiation mechanisms. We present a ., allowing name-servers to send responses containing only the keys and signatures required by the requesting resolver. Our design is compatible with intermediary proxies, and even with legacy proxies, t

Texture 发表于 2025-3-29 15:00:32

A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System,nd memorable mapping without a trusted authority. GNS uses the transitivity in the SDSI design to replace the trusted root with secure delegation of authority, thus making petnames useful to other users while operating under a very strong adversary model. In addition to describing the GNS design, we

bacteria 发表于 2025-3-29 15:38:37

Converting PKI-Based Authenticated Key Exchange to Identity-Based,t can be instantiated from various kinds of number-theoretic assumptions such as RSA and lattices as well as Diffie-Hellman variants) thanks to rich instantiability of known PKI-AKE schemes in the pre-specified peer model.

AFFIX 发表于 2025-3-29 20:51:45

Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi an honest receiver, we use the framework presented by Küsters et al. for the cryptographic verification of Java programs. As part of our work, we add oblivious transfer to the set of cryptographic primitives supported by the framework. This is a general contribution beyond our results for concrete

nitroglycerin 发表于 2025-3-30 02:54:45

Mining API Calls and Permissions for Android Malware Detection,ng Naive Bayesian as well as K-Nearest Neighbour classifiers. Proposed models are able to detect real malwares in the wild and achieve an accuracy of 95.1% and true positive rate with highest value one.

temperate 发表于 2025-3-30 05:35:19

http://reply.papertrans.cn/25/2407/240601/240601_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Cryptology and Network Security; 13th International C Dimitris Gritzalis,Aggelos Kiayias,Ioannis Askoxyl Conference proceedings 2014 Spring