无价值 发表于 2025-3-23 12:05:43
Two New Module-Code-Based KEMs with Rank Metricf Fujisaki-Okamoto transform to Piglet-1.CPAPKE. We also put a new IND-CPA-secure KEM Piglet-2.CPAKEM into Piglet. Then, we present the parameters comparison between our schemes and some code-based NIST submissions. The results show that our schemes are good long-term-secure candidates for post-quantum cryptography.Postulate 发表于 2025-3-23 15:03:05
http://reply.papertrans.cn/47/4655/465402/465402_12.png尖牙 发表于 2025-3-23 21:57:14
Pseudorandom Functions from LWE: RKA Security and Applicationand Peikert in CRYPTO 2014. We prove that the PRF is secure against unique-input key shift attacks and restricted affine attacks. After that, we use this RKA-secure PRF to construct a robustly reusable fuzzy extractor, which enjoys higher efficiency and better error correction rate.Inflammation 发表于 2025-3-24 01:41:39
http://reply.papertrans.cn/47/4655/465402/465402_14.png陈旧 发表于 2025-3-24 05:25:19
http://reply.papertrans.cn/47/4655/465402/465402_15.pngRedundant 发表于 2025-3-24 09:21:06
Information Security and Privacy978-3-030-21548-4Series ISSN 0302-9743 Series E-ISSN 1611-3349全部逛商店 发表于 2025-3-24 12:42:21
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465402.jpg纯朴 发表于 2025-3-24 17:38:57
http://reply.papertrans.cn/47/4655/465402/465402_18.pngconduct 发表于 2025-3-24 21:49:31
as been sponsoring a noncritical compilation of metal complex formation constants and related equilibrium constants. This work was extensive in scope and resulted in the publication of two large volumes of Stability Constants by the Chemical Society (London). The first volume, edited by L. G. SillenHarrowing 发表于 2025-3-25 01:02:31
http://reply.papertrans.cn/47/4655/465402/465402_20.png