FOLD 发表于 2025-3-28 16:19:51

M. Beilhackold .. We ask the question: “is it possible to construct MPC in this setting s.t. the communication complexity per multiplication gate is linear in the number of parties?” While a number of works have focused on reducing the communication complexity in this setting, the answer to the above question

sorbitol 发表于 2025-3-28 21:25:04

http://reply.papertrans.cn/43/4235/423424/423424_42.png

placebo-effect 发表于 2025-3-29 01:51:52

http://reply.papertrans.cn/43/4235/423424/423424_43.png

Eructation 发表于 2025-3-29 04:56:07

http://reply.papertrans.cn/43/4235/423424/423424_44.png

Brochure 发表于 2025-3-29 10:13:27

U. Kleins: Let . refer to the . most significant bits of .. Given many samples . for random ., the goal is to recover the hidden number .. MIHNP is an important class of Hidden Number Problem..In this paper, we revisit the Coppersmith technique for solving a class of modular polynomial equations, which is r

thyroid-hormone 发表于 2025-3-29 13:17:58

http://reply.papertrans.cn/43/4235/423424/423424_46.png

Hormones 发表于 2025-3-29 19:34:44

http://reply.papertrans.cn/43/4235/423424/423424_47.png

意外 发表于 2025-3-29 22:41:59

W. Szubinskience, CRYPTO 2019, held in Santa Barbara, CA, USA, in August 2019...The 81 revised full papers presented were carefully reviewed and selected from 378 submissions. The papers are organized in the following topical sections:..Part I: Award papers; lattice-based ZK; symmetric cryptography; mathematica

Rotator-Cuff 发表于 2025-3-30 00:10:39

F. Rollcryptographic study. All known approaches to constructing . rely on .. While secure . are well established in cryptographic literature, the security of candidates for . is poorly understood..We propose a new approach to constructing . for general circuits. Unlike all previously known realizations of

勉强 发表于 2025-3-30 05:03:38

A. Wittmoser for an adversary to remove a watermark from a marked program without corrupting its behavior. Existing constructions of software watermarking from standard assumptions have focused exclusively on watermarking pseudorandom functions (PRFs)..In this work, we study watermarking public-key primitives s
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Handbuch der Gießerei-Technik; Zweiter Band / 2. Te F. Roll (Abteilungsleiter für Gießereiwesen) Book 1963 Springer-Verlag OHG., Berlin/Göt