不同 发表于 2025-3-21 17:44:27
书目名称Information Security Theory and Practice影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0465341<br><br> <br><br>书目名称Information Security Theory and Practice影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0465341<br><br> <br><br>书目名称Information Security Theory and Practice网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0465341<br><br> <br><br>书目名称Information Security Theory and Practice网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0465341<br><br> <br><br>书目名称Information Security Theory and Practice被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0465341<br><br> <br><br>书目名称Information Security Theory and Practice被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0465341<br><br> <br><br>书目名称Information Security Theory and Practice年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0465341<br><br> <br><br>书目名称Information Security Theory and Practice年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0465341<br><br> <br><br>书目名称Information Security Theory and Practice读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0465341<br><br> <br><br>书目名称Information Security Theory and Practice读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0465341<br><br> <br><br>photopsia 发表于 2025-3-21 21:48:47
A Generic View on the Unified Zero-Knowledge Protocol and Its Applicationshe security of our UGZK protocol and discuss special cases. Compared to UZK, the new protocol allows to prove knowledge of a vector of secrets instead of only one secret. We also provide the reader with a hash variant of UGZK and the corresponding security analysis. Last but not least, we extend Cogintricacy 发表于 2025-3-22 00:25:40
Verifiable and Private Oblivious Polynomial Evaluationr, we formally define . (VPOPE) scheme. We design a scheme called Verifiable . Paillier based Private Oblivious Polynomial Evaluation (VIP-POPE). Using security properties of Private Polynomial Evaluation (PPE) schemes and Oblivious Polynomial Evaluation (OPE) schemes, we prove that our scheme is .,Encumber 发表于 2025-3-22 08:23:12
http://reply.papertrans.cn/47/4654/465341/465341_4.png欺骗世家 发表于 2025-3-22 11:01:54
Strong Designated Verifier Signature Based on the Rank Metricer and the designated verifier can check the validity of a given signature, which preserves the privacy of the signer. This cryptographic primitive is very useful in different real life scenarios such as e-voting and e-bidding. In this paper, we propose a strong designated verifier signature scheme兽皮 发表于 2025-3-22 14:31:49
A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Thingslly) replacing RSA and ECC. NTRU Prime is a variant of the classical NTRU cryptosystem that comes with a couple of tweaks to minimize the attack surface; most notably, it avoids rings with “worrisome” structure. This paper presents, to our knowledge, the first assembler-optimized implementation of SRALES 发表于 2025-3-22 19:27:44
http://reply.papertrans.cn/47/4654/465341/465341_7.pngDiuretic 发表于 2025-3-22 22:34:19
http://reply.papertrans.cn/47/4654/465341/465341_8.pngSalivary-Gland 发表于 2025-3-23 01:52:00
http://reply.papertrans.cn/47/4654/465341/465341_9.pngPopcorn 发表于 2025-3-23 06:35:43
http://reply.papertrans.cn/47/4654/465341/465341_10.png