仔细检查 发表于 2025-3-26 22:21:01

More Accurate Division Property Propagations Based on Optimized Implementations of Linear Layersf automatic tools, such as Mixed Integer Linear Programming (MILP) and Boolean Satisfiability Problem (SAT) solvers. In this case, the accuracy of corresponding models will influence the resulting distinguishers. In this paper, we present a new technique to characterize the division property propaga

碳水化合物 发表于 2025-3-27 03:36:19

Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomiar maps filling in the gap between two polynomial maps over a finite field. At PQC 2020, Santoso proposed a problem originated from IP2S, which is called block isomorphism of polynomials with circulant matrices (BIPC) problem. The BIPC problem is obtained by linearizing IP2S and restricting secret l

Minatory 发表于 2025-3-27 08:00:21

Attacking ECDSA Leaking Discrete Bits with a More Efficient Latticethe information leaked and then recovers the secret key by finding a certain short lattice vector. When the information leaked is discrete bits, Fan et al. (CCS 2016) constructed an efficient lattice by translating the problem of recovering the secret key to the Extended Hidden Number Problem (EHNP)

colostrum 发表于 2025-3-27 11:47:55

A Simple Post-Quantum Non-interactive Zero-Knowledge Proof from Garbled Circuitsto make it non-interactive. Our construction can be regarded as a simplified cut-and-choose-based malicious secure two-party computation for the zero-knowledge functionality. Our protocol is suitable for pedagogical purpose for its simplicity (code is only 728 lines).

Inflated 发表于 2025-3-27 16:40:46

978-3-030-88322-5Springer Nature Switzerland AG 2021

Introvert 发表于 2025-3-27 21:05:31

http://reply.papertrans.cn/47/4654/465356/465356_36.png

死亡 发表于 2025-3-27 22:52:27

http://reply.papertrans.cn/47/4654/465356/465356_37.png

commonsense 发表于 2025-3-28 03:21:10

Concurrent Signatures from a Variety of Keysne) is released. Such a signature is developed by Chen ., but it restricts signers to using the same public parameters. We describe and analyse a new concurrent signature that allows users to sign documents even if they use different underlying hard problems when generating their public parameters.

Colonnade 发表于 2025-3-28 08:04:51

http://reply.papertrans.cn/47/4654/465356/465356_39.png

流浪者 发表于 2025-3-28 11:16:54

Conference proceedings 2021ugust 2021. Due the COVID-19, the conference was held online.The 28 full papers presented were carefully reviewed and selected from 81 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications. .
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Information Security and Cryptology; 17th International C Yu Yu,Moti Yung Conference proceedings 2021 Springer Nature Switzerland AG 2021 S