致敬 发表于 2025-3-30 08:21:36

Distributed Key Generation for SM9-Based Systemstems is quite challenging. For instance, a leakage of the master secret key will result in the leakage of all IoT devices’ private keys. SM9 is the only approved IBC algorithm standard in China. It is critical to have mechanisms to protect the SM9 master secret keys. In this work, to reduce the risk

贪心 发表于 2025-3-30 16:19:59

http://reply.papertrans.cn/47/4654/465367/465367_52.png

Factorable 发表于 2025-3-30 18:41:42

CSURF-TWO: CSIDH for the Ratio (2 : 1)ile CSURF considered those of Montgomery. form with . . 8). The two protocols both have ratio (1:1) between the coefficients and the .-isomorphism classes. Castryck and Decru showed that the ratio became (2:1) when Montgomery supersingular curves with endomorphism ring . and . . 8) were considered.

有效 发表于 2025-3-30 21:03:14

http://reply.papertrans.cn/47/4654/465367/465367_54.png

eulogize 发表于 2025-3-31 03:49:02

http://reply.papertrans.cn/47/4654/465367/465367_55.png

fringe 发表于 2025-3-31 05:49:13

http://reply.papertrans.cn/47/4654/465367/465367_56.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Information Security and Cryptology; 16th International C Yongdong Wu,Moti Yung Conference proceedings 2021 Springer Nature Switzerland AG