清楚 发表于 2025-3-25 04:39:28
http://reply.papertrans.cn/47/4654/465387/465387_21.pngamplitude 发表于 2025-3-25 09:33:59
Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings Gentry, Sahai and Waters ‘GSW’ (CRYPTO’13) as building blocks of our schemes. We apply their . method to our scheme. In contrast to the GSW scheme we provide extensions of the (leveled) homomorphic identity-based encryption (IBE) and (leveled) homomorphic attribute-based encryption (ABE) on the mulExpediency 发表于 2025-3-25 14:05:15
Improved Key Generation Algorithm for Gentry’s Fully Homomorphic Encryption Schemeo generate an odd-determinant ideal lattice having a particular type of Hermite Normal Form. However, they did not give a rigorous proof for the correctness. We present a better key generation algorithm, improving their algorithm from two aspects..As a result, our key generation is about 1.5 times felastic 发表于 2025-3-25 18:18:42
http://reply.papertrans.cn/47/4654/465387/465387_24.pngCommunal 发表于 2025-3-25 20:54:10
Novel Leakage Against Realistic Masking and Shuffling Countermeasureses be applied only to some rounds to improve performance. Herein, we define combinations of partial shuffling and masking countermeasures as . shuffling and masking countermeasures..Moreover, we propose a novel leakage on . shuffling and masking countermeasures that have low attack complexity and aPALMY 发表于 2025-3-26 00:20:38
http://reply.papertrans.cn/47/4654/465387/465387_26.pngamphibian 发表于 2025-3-26 07:54:41
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processorsial quantum threats. Various Ring-LWE implementation works mainly focused on optimization techniques to reduce the execution timing and memory consumptions for high availability. For this reason, they failed to provide secure implementations against general side channel attacks, such as timing attacCholesterol 发表于 2025-3-26 08:32:49
http://reply.papertrans.cn/47/4654/465387/465387_28.png珍奇 发表于 2025-3-26 14:21:02
http://reply.papertrans.cn/47/4654/465387/465387_29.pngfringe 发表于 2025-3-26 19:32:02
Solving 114-Bit ECDLP for a Barreto-Naehrig Curvehm problem (ECDLP). In this paper, the authors describe techniques applied to solve 114-bit ECDLP in Barreto-Naehrig (BN) curve defined over the odd characteristic field. Unlike generic elliptic curves, BN curve holds an especial interest since it is well studied in pairing-based cryptography. Till