debris 发表于 2025-3-25 05:05:59

Privacy Assurances in Multiple Data-Aggregation Transactionspplication. The aggregation is performed using the most commonly used weighted sum function. The new algorithm has several novel features. First, we propose a method to generate a privacy-assurance certificate that can be easily verified by all users without significant computation effort. In partic

OPINE 发表于 2025-3-25 07:33:59

A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computationtions as well as reactive tasks, where the exact computation is not known in advance. We extend this line of work by exploring efficient datastructures based on MPC primitives. The oblivious RAM (ORAM) provides a completeness theorem. However, implementing the ORAM-CPU using MPC-primitives is costly

incarcerate 发表于 2025-3-25 14:07:21

http://reply.papertrans.cn/47/4654/465381/465381_23.png

Ingratiate 发表于 2025-3-25 17:24:38

http://reply.papertrans.cn/47/4654/465381/465381_24.png

wangle 发表于 2025-3-25 23:34:40

http://reply.papertrans.cn/47/4654/465381/465381_25.png

arthroplasty 发表于 2025-3-26 03:08:35

http://reply.papertrans.cn/47/4654/465381/465381_26.png

前面 发表于 2025-3-26 07:19:12

Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Ave been introduced to efficiently analyze cryptographic modules. A power trace selection method for improving attack efficiency was recently presented; however, applying it involves many restrictions. Therefore, we propose a new selection method to improve power analysis attacks using principal comp

A精确的 发表于 2025-3-26 08:36:03

Impossible Differential Attack on Reduced-Round TWINEr 128-bit keys. In this paper, we give impossible differential attacks on both versions of the cipher, which is an improvement over what the designers claimed to be the best possible. Although our results are not the best considering different cryptanalysis methods, our algorithm which can filter wr

cortex 发表于 2025-3-26 13:01:26

http://reply.papertrans.cn/47/4654/465381/465381_29.png

recession 发表于 2025-3-26 19:26:00

First Multidimensional Cryptanalysis on Reduced-Round ,and multidimensional linear cryptanalysis based their theoretical foundation on the independent-key assumption, so that they cannot be evaluated accurately in the case of ciphers with identical round-key. In this paper we propose a new classification technique to overcome this obstacle. In our new t
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Information Security and Cryptology -- ICISC 2013; 16th International C Hyang-Sook Lee,Dong-Guk Han Conference proceedings 2014 Springer In