无价值 发表于 2025-3-23 12:05:43

Two New Module-Code-Based KEMs with Rank Metricf Fujisaki-Okamoto transform to Piglet-1.CPAPKE. We also put a new IND-CPA-secure KEM Piglet-2.CPAKEM into Piglet. Then, we present the parameters comparison between our schemes and some code-based NIST submissions. The results show that our schemes are good long-term-secure candidates for post-quantum cryptography.

Postulate 发表于 2025-3-23 15:03:05

http://reply.papertrans.cn/47/4655/465402/465402_12.png

尖牙 发表于 2025-3-23 21:57:14

Pseudorandom Functions from LWE: RKA Security and Applicationand Peikert in CRYPTO 2014. We prove that the PRF is secure against unique-input key shift attacks and restricted affine attacks. After that, we use this RKA-secure PRF to construct a robustly reusable fuzzy extractor, which enjoys higher efficiency and better error correction rate.

Inflammation 发表于 2025-3-24 01:41:39

http://reply.papertrans.cn/47/4655/465402/465402_14.png

陈旧 发表于 2025-3-24 05:25:19

http://reply.papertrans.cn/47/4655/465402/465402_15.png

Redundant 发表于 2025-3-24 09:21:06

Information Security and Privacy978-3-030-21548-4Series ISSN 0302-9743 Series E-ISSN 1611-3349

全部逛商店 发表于 2025-3-24 12:42:21

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465402.jpg

纯朴 发表于 2025-3-24 17:38:57

http://reply.papertrans.cn/47/4655/465402/465402_18.png

conduct 发表于 2025-3-24 21:49:31

as been sponsoring a noncritical compilation of metal complex formation constants and related equilibrium constants. This work was extensive in scope and resulted in the publication of two large volumes of Stability Constants by the Chemical Society (London). The first volume, edited by L. G. Sillen

Harrowing 发表于 2025-3-25 01:02:31

http://reply.papertrans.cn/47/4655/465402/465402_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Information Security and Privacy; 24th Australasian Co Julian Jang-Jaccard,Fuchun Guo Conference proceedings 2019 Springer Nature Switzerla