灯泡 发表于 2025-3-28 15:12:13

http://reply.papertrans.cn/25/2407/240605/240605_41.png

泥沼 发表于 2025-3-28 21:56:22

Optimized and Secure Pairing-Friendly Elliptic Curves Suitable for One Layer Proof Compositionn-interactive, short and cheap to verify. This property makes them suitable for recursive proof composition, that is proofs attesting to the validity of other proofs. To achieve this, one . the arithmetic operations .. Recursive proof composition has been empirically demonstrated for pairing-based S

多骨 发表于 2025-3-29 00:38:41

http://reply.papertrans.cn/25/2407/240605/240605_43.png

pancreas 发表于 2025-3-29 06:25:00

http://reply.papertrans.cn/25/2407/240605/240605_44.png

strdulate 发表于 2025-3-29 07:31:38

An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemessignature scheme based on the hardness of the permuted kernel problem) and list other schemes that may be affected. Finally, we use our analysis to choose parameters and investigate the performance of a 5-round variant of the Picnic scheme.

GOAT 发表于 2025-3-29 13:04:23

http://reply.papertrans.cn/25/2407/240605/240605_46.png

Bumble 发表于 2025-3-29 17:52:54

http://reply.papertrans.cn/25/2407/240605/240605_47.png

Arb853 发表于 2025-3-29 21:08:17

http://reply.papertrans.cn/25/2407/240605/240605_48.png

细颈瓶 发表于 2025-3-30 00:19:24

http://reply.papertrans.cn/25/2407/240605/240605_49.png

Adjourn 发表于 2025-3-30 07:06:53

http://reply.papertrans.cn/25/2407/240605/240605_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Cryptology and Network Security; 19th International C Stephan Krenn,Haya Shulman,Serge Vaudenay Conference proceedings 2020 Springer Nature