Neutropenia 发表于 2025-3-25 04:00:38

Markulf Kohlweiss,Roberto Di Pietro,Alastair Beres

endarterectomy 发表于 2025-3-25 07:47:04

http://reply.papertrans.cn/25/2426/242503/242503_22.png

畏缩 发表于 2025-3-25 12:41:04

Cryptographic Cryptid Protocolsclue as to which cell on the map contains the cryptid. Players take it in turns to ask each other if the cryptid could be on a given cell according to their clue, until one of them guesses the cryptid cell. This game is great fun, but completely loses its interest if one of the players cheats by ans

B-cell 发表于 2025-3-25 19:05:54

http://reply.papertrans.cn/25/2426/242503/242503_24.png

浪费时间 发表于 2025-3-25 23:56:21

http://reply.papertrans.cn/25/2426/242503/242503_25.png

同时发生 发表于 2025-3-26 00:15:42

Compact Post-quantum Bounded-Collusion Identity-Based Encryptionfor a collusion-parameter .. From results of existing work, there are generic constructions of BC-IBE, which starts from public key encryption (PKE) schemes with several properties. In particular, we consider BC-IBE schemes constructed from post-quantum PKE schemes submitted to the NIST-PQC competit

侵略 发表于 2025-3-26 07:35:32

http://reply.papertrans.cn/25/2426/242503/242503_27.png

大骂 发表于 2025-3-26 10:09:11

http://reply.papertrans.cn/25/2426/242503/242503_28.png

有毒 发表于 2025-3-26 13:47:14

Taming Delegations in Anonymous Signatures: ,-Times Anonymity for Proxy and Sanitizable Signaturentity is disclosed and all its previous signatures can be identified. In this paper, we show how this property can be achieved for delegation-supported signature schemes, especially proxy signatures, where the signer allows a delegate to sign on its behalf, and sanitizable signatures, where a signer

荣幸 发表于 2025-3-26 18:32:48

http://reply.papertrans.cn/25/2426/242503/242503_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Cryptology and Network Security; 23rd International C Markulf Kohlweiss,Roberto Di Pietro,Alastair Beres Conference proceedings 2025 The Ed