一条卷发 发表于 2025-3-25 03:56:33
http://reply.papertrans.cn/43/4235/423419/423419_21.pngMURKY 发表于 2025-3-25 11:34:40
ity and superiority over current constructions. With the new VSS scheme, for parameter sets . and (2048, 1023), a dealer can share a secret in less than 0.02 and 2.0 s, respectively, and shareholders can verify their shares in less than 0.4 and 5.0 ms. Compared to the well-established Pedersen VSS sCRUMB 发表于 2025-3-25 14:04:24
Erich Potthoff,Heinrich Zintzen,Karl Halftn be run ontop of the relays and which provides active-security with abort in the case of a strong honest majority, even when run with stragglers. We back up our protocol presentation with both experimental evaluations and simulations of the effect of the relays and delays on our protocol.旧石器时代 发表于 2025-3-25 18:12:28
Erich Potthoff,Heinrich Zintzen,Karl Halftes; security proofs andsecurity models; .Part VII: post-quantum cryptography; .Part VIII: quantum cryptography; key exchange; symmetric-key design..978-981-99-8738-2978-981-99-8739-9Series ISSN 0302-9743 Series E-ISSN 1611-3349问到了烧瓶 发表于 2025-3-25 23:01:33
Erich Potthoff,Heinrich Zintzen,Karl Halft to its Frobenius conjugate by an isogeny of small degree..For FESTA, where the curve . is already .-rational, we obtain a polynomial time attack under the added requirement that at least one of the basis points . spans an eigenspace of Frobenius, of an endomorphism of low degree, or of a compositio无弹性 发表于 2025-3-26 03:55:05
Erich Potthoff,Heinrich Zintzen,Karl Halftspaces generated by the entries of any two sub-matrices is a null space, and investigate the decoding algorithms for .-errors. We find that the gain of using .-errors in decoding capacity outweighs the complexity loss in solving the .-RD problem, which makes it possible to design more efficient rank随意 发表于 2025-3-26 08:05:51
Erich Potthoff,Heinrich Zintzen,Karl Halftuctions use bilinear maps: one is secure in the standard model under q-DDHI and SXDH, one is secure in the random oracle model under SXDH, and the most efficient of the three is secure in the random oracle model and generic bilinear group model.宏伟 发表于 2025-3-26 08:56:24
http://reply.papertrans.cn/43/4235/423419/423419_28.pngmeditation 发表于 2025-3-26 13:18:47
http://reply.papertrans.cn/43/4235/423419/423419_29.png用肘 发表于 2025-3-26 20:34:21
Erich Potthoff,Heinrich Zintzen,Karl Halftcoding, source coding, and error correction benefits. It has been demonstrated that this approach provides significant improvements compared to previous work by reducing the required number of queries, such as the number of traces in a power attack..The framework is demonstrated and implemented in t