不同 发表于 2025-3-21 17:44:27

书目名称Information Security Theory and Practice影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465341<br><br>        <br><br>书目名称Information Security Theory and Practice影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465341<br><br>        <br><br>书目名称Information Security Theory and Practice网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465341<br><br>        <br><br>书目名称Information Security Theory and Practice网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465341<br><br>        <br><br>书目名称Information Security Theory and Practice被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465341<br><br>        <br><br>书目名称Information Security Theory and Practice被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465341<br><br>        <br><br>书目名称Information Security Theory and Practice年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465341<br><br>        <br><br>书目名称Information Security Theory and Practice年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465341<br><br>        <br><br>书目名称Information Security Theory and Practice读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465341<br><br>        <br><br>书目名称Information Security Theory and Practice读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465341<br><br>        <br><br>

photopsia 发表于 2025-3-21 21:48:47

A Generic View on the Unified Zero-Knowledge Protocol and Its Applicationshe security of our UGZK protocol and discuss special cases. Compared to UZK, the new protocol allows to prove knowledge of a vector of secrets instead of only one secret. We also provide the reader with a hash variant of UGZK and the corresponding security analysis. Last but not least, we extend Cog

intricacy 发表于 2025-3-22 00:25:40

Verifiable and Private Oblivious Polynomial Evaluationr, we formally define . (VPOPE) scheme. We design a scheme called Verifiable . Paillier based Private Oblivious Polynomial Evaluation (VIP-POPE). Using security properties of Private Polynomial Evaluation (PPE) schemes and Oblivious Polynomial Evaluation (OPE) schemes, we prove that our scheme is .,

Encumber 发表于 2025-3-22 08:23:12

http://reply.papertrans.cn/47/4654/465341/465341_4.png

欺骗世家 发表于 2025-3-22 11:01:54

Strong Designated Verifier Signature Based on the Rank Metricer and the designated verifier can check the validity of a given signature, which preserves the privacy of the signer. This cryptographic primitive is very useful in different real life scenarios such as e-voting and e-bidding. In this paper, we propose a strong designated verifier signature scheme

兽皮 发表于 2025-3-22 14:31:49

A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Thingslly) replacing RSA and ECC. NTRU Prime is a variant of the classical NTRU cryptosystem that comes with a couple of tweaks to minimize the attack surface; most notably, it avoids rings with “worrisome” structure. This paper presents, to our knowledge, the first assembler-optimized implementation of S

RALES 发表于 2025-3-22 19:27:44

http://reply.papertrans.cn/47/4654/465341/465341_7.png

Diuretic 发表于 2025-3-22 22:34:19

http://reply.papertrans.cn/47/4654/465341/465341_8.png

Salivary-Gland 发表于 2025-3-23 01:52:00

http://reply.papertrans.cn/47/4654/465341/465341_9.png

Popcorn 发表于 2025-3-23 06:35:43

http://reply.papertrans.cn/47/4654/465341/465341_10.png
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Information Security Theory and Practice; 13th IFIP WG 11.2 In Maryline Laurent,Thanassis Giannetsos Conference proceedings 2020 IFIP Inter