无价值
发表于 2025-3-23 12:05:43
Two New Module-Code-Based KEMs with Rank Metricf Fujisaki-Okamoto transform to Piglet-1.CPAPKE. We also put a new IND-CPA-secure KEM Piglet-2.CPAKEM into Piglet. Then, we present the parameters comparison between our schemes and some code-based NIST submissions. The results show that our schemes are good long-term-secure candidates for post-quantum cryptography.
Postulate
发表于 2025-3-23 15:03:05
http://reply.papertrans.cn/47/4655/465402/465402_12.png
尖牙
发表于 2025-3-23 21:57:14
Pseudorandom Functions from LWE: RKA Security and Applicationand Peikert in CRYPTO 2014. We prove that the PRF is secure against unique-input key shift attacks and restricted affine attacks. After that, we use this RKA-secure PRF to construct a robustly reusable fuzzy extractor, which enjoys higher efficiency and better error correction rate.
Inflammation
发表于 2025-3-24 01:41:39
http://reply.papertrans.cn/47/4655/465402/465402_14.png
陈旧
发表于 2025-3-24 05:25:19
http://reply.papertrans.cn/47/4655/465402/465402_15.png
Redundant
发表于 2025-3-24 09:21:06
Information Security and Privacy978-3-030-21548-4Series ISSN 0302-9743 Series E-ISSN 1611-3349
全部逛商店
发表于 2025-3-24 12:42:21
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465402.jpg
纯朴
发表于 2025-3-24 17:38:57
http://reply.papertrans.cn/47/4655/465402/465402_18.png
conduct
发表于 2025-3-24 21:49:31
as been sponsoring a noncritical compilation of metal complex formation constants and related equilibrium constants. This work was extensive in scope and resulted in the publication of two large volumes of Stability Constants by the Chemical Society (London). The first volume, edited by L. G. Sillen
Harrowing
发表于 2025-3-25 01:02:31
http://reply.papertrans.cn/47/4655/465402/465402_20.png