清楚 发表于 2025-3-25 04:39:28

http://reply.papertrans.cn/47/4654/465387/465387_21.png

amplitude 发表于 2025-3-25 09:33:59

Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings Gentry, Sahai and Waters ‘GSW’ (CRYPTO’13) as building blocks of our schemes. We apply their . method to our scheme. In contrast to the GSW scheme we provide extensions of the (leveled) homomorphic identity-based encryption (IBE) and (leveled) homomorphic attribute-based encryption (ABE) on the mul

Expediency 发表于 2025-3-25 14:05:15

Improved Key Generation Algorithm for Gentry’s Fully Homomorphic Encryption Schemeo generate an odd-determinant ideal lattice having a particular type of Hermite Normal Form. However, they did not give a rigorous proof for the correctness. We present a better key generation algorithm, improving their algorithm from two aspects..As a result, our key generation is about 1.5 times f

elastic 发表于 2025-3-25 18:18:42

http://reply.papertrans.cn/47/4654/465387/465387_24.png

Communal 发表于 2025-3-25 20:54:10

Novel Leakage Against Realistic Masking and Shuffling Countermeasureses be applied only to some rounds to improve performance. Herein, we define combinations of partial shuffling and masking countermeasures as . shuffling and masking countermeasures..Moreover, we propose a novel leakage on . shuffling and masking countermeasures that have low attack complexity and a

PALMY 发表于 2025-3-26 00:20:38

http://reply.papertrans.cn/47/4654/465387/465387_26.png

amphibian 发表于 2025-3-26 07:54:41

Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processorsial quantum threats. Various Ring-LWE implementation works mainly focused on optimization techniques to reduce the execution timing and memory consumptions for high availability. For this reason, they failed to provide secure implementations against general side channel attacks, such as timing attac

Cholesterol 发表于 2025-3-26 08:32:49

http://reply.papertrans.cn/47/4654/465387/465387_28.png

珍奇 发表于 2025-3-26 14:21:02

http://reply.papertrans.cn/47/4654/465387/465387_29.png

fringe 发表于 2025-3-26 19:32:02

Solving 114-Bit ECDLP for a Barreto-Naehrig Curvehm problem (ECDLP). In this paper, the authors describe techniques applied to solve 114-bit ECDLP in Barreto-Naehrig (BN) curve defined over the odd characteristic field. Unlike generic elliptic curves, BN curve holds an especial interest since it is well studied in pairing-based cryptography. Till
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Information Security and Cryptology – ICISC 2017; 20th International C Howon Kim,Dong-Chan Kim Conference proceedings 2018 Springer Interna