debris 发表于 2025-3-25 05:05:59
Privacy Assurances in Multiple Data-Aggregation Transactionspplication. The aggregation is performed using the most commonly used weighted sum function. The new algorithm has several novel features. First, we propose a method to generate a privacy-assurance certificate that can be easily verified by all users without significant computation effort. In particOPINE 发表于 2025-3-25 07:33:59
A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computationtions as well as reactive tasks, where the exact computation is not known in advance. We extend this line of work by exploring efficient datastructures based on MPC primitives. The oblivious RAM (ORAM) provides a completeness theorem. However, implementing the ORAM-CPU using MPC-primitives is costlyincarcerate 发表于 2025-3-25 14:07:21
http://reply.papertrans.cn/47/4654/465381/465381_23.pngIngratiate 发表于 2025-3-25 17:24:38
http://reply.papertrans.cn/47/4654/465381/465381_24.pngwangle 发表于 2025-3-25 23:34:40
http://reply.papertrans.cn/47/4654/465381/465381_25.pngarthroplasty 发表于 2025-3-26 03:08:35
http://reply.papertrans.cn/47/4654/465381/465381_26.png前面 发表于 2025-3-26 07:19:12
Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Ave been introduced to efficiently analyze cryptographic modules. A power trace selection method for improving attack efficiency was recently presented; however, applying it involves many restrictions. Therefore, we propose a new selection method to improve power analysis attacks using principal compA精确的 发表于 2025-3-26 08:36:03
Impossible Differential Attack on Reduced-Round TWINEr 128-bit keys. In this paper, we give impossible differential attacks on both versions of the cipher, which is an improvement over what the designers claimed to be the best possible. Although our results are not the best considering different cryptanalysis methods, our algorithm which can filter wrcortex 发表于 2025-3-26 13:01:26
http://reply.papertrans.cn/47/4654/465381/465381_29.pngrecession 发表于 2025-3-26 19:26:00
First Multidimensional Cryptanalysis on Reduced-Round ,and multidimensional linear cryptanalysis based their theoretical foundation on the independent-key assumption, so that they cannot be evaluated accurately in the case of ciphers with identical round-key. In this paper we propose a new classification technique to overcome this obstacle. In our new t