致敬 发表于 2025-3-30 08:21:36
Distributed Key Generation for SM9-Based Systemstems is quite challenging. For instance, a leakage of the master secret key will result in the leakage of all IoT devices’ private keys. SM9 is the only approved IBC algorithm standard in China. It is critical to have mechanisms to protect the SM9 master secret keys. In this work, to reduce the risk贪心 发表于 2025-3-30 16:19:59
http://reply.papertrans.cn/47/4654/465367/465367_52.pngFactorable 发表于 2025-3-30 18:41:42
CSURF-TWO: CSIDH for the Ratio (2 : 1)ile CSURF considered those of Montgomery. form with . . 8). The two protocols both have ratio (1:1) between the coefficients and the .-isomorphism classes. Castryck and Decru showed that the ratio became (2:1) when Montgomery supersingular curves with endomorphism ring . and . . 8) were considered.有效 发表于 2025-3-30 21:03:14
http://reply.papertrans.cn/47/4654/465367/465367_54.pngeulogize 发表于 2025-3-31 03:49:02
http://reply.papertrans.cn/47/4654/465367/465367_55.pngfringe 发表于 2025-3-31 05:49:13
http://reply.papertrans.cn/47/4654/465367/465367_56.png