无弹性 发表于 2025-3-25 03:32:52

http://reply.papertrans.cn/25/2407/240605/240605_21.png

栏杆 发表于 2025-3-25 09:55:09

http://reply.papertrans.cn/25/2407/240605/240605_22.png

Lasting 发表于 2025-3-25 13:57:36

dom” passwords, so they reuse or create similar passwords using a combination of predictable words, numbers, and symbols [.]. Previous password-generation or management protocols have imposed so large a cognitive load that users have abandoned them in favor of insecure yet simpler methods (., writin

上涨 发表于 2025-3-25 19:34:48

http://reply.papertrans.cn/25/2407/240605/240605_24.png

Gobble 发表于 2025-3-25 22:31:11

http://reply.papertrans.cn/25/2407/240605/240605_25.png

轻快来事 发表于 2025-3-26 00:56:18

logarithm and isogeny-based cryptography). We give an instantiation based on the semi-commutative action of isogenies of supersingular elliptic curves, in the style of the SIDH key-exchange protocol. We then construct an oblivious transfer protocol using this new structure and prove that it UC-secu

Abjure 发表于 2025-3-26 07:05:38

http://reply.papertrans.cn/25/2407/240605/240605_27.png

全国性 发表于 2025-3-26 10:59:49

http://reply.papertrans.cn/25/2407/240605/240605_28.png

使厌恶 发表于 2025-3-26 13:31:23

http://reply.papertrans.cn/25/2407/240605/240605_29.png

SLING 发表于 2025-3-26 18:04:06

http://reply.papertrans.cn/25/2407/240605/240605_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Cryptology and Network Security; 19th International C Stephan Krenn,Haya Shulman,Serge Vaudenay Conference proceedings 2020 Springer Nature