Generator 发表于 2025-3-26 22:19:42
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465412.jpgmitten 发表于 2025-3-27 02:12:35
978-3-031-22300-6The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl统治人类 发表于 2025-3-27 08:12:08
Information Security and Privacy978-3-031-22301-3Series ISSN 0302-9743 Series E-ISSN 1611-3349Alveoli 发表于 2025-3-27 10:07:01
https://doi.org/10.1007/978-3-031-22301-3authentication; block ciphers; blockchain; computer networks; computer security; computer systems; cryptanBOOR 发表于 2025-3-27 13:35:56
http://reply.papertrans.cn/47/4655/465412/465412_35.pngCollar 发表于 2025-3-27 20:07:29
http://reply.papertrans.cn/47/4655/465412/465412_36.png懒洋洋 发表于 2025-3-27 22:33:26
http://reply.papertrans.cn/47/4655/465412/465412_37.pngAssault 发表于 2025-3-28 02:15:30
Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018, which is shown to require exponential complexity for the proposed attack. Additionally, we apply this attack to cryptanalyze another Gabidulin code based cryptosystem proposed by Loidreau at PQCrypto 2017, and improve Loidreau’s result in a talk at CBCrypto 2021.Density 发表于 2025-3-28 09:07:58
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryptionith both efficiency and richer functionality are known so far. In this paper, we propose a “two-level" KH-PKE scheme for evaluating degree-two polynomials, by cleverly combining Emura et al.’s generic framework with a recent efficient two-level HE by Attrapadung et al. (ASIACCS 2018).fodlder 发表于 2025-3-28 14:02:19
Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspaces indistinguishable from signatures generated by the signer. Only the signer and the designated entity can generate a valid signature for any combined vector. Finally, we prove our scheme is secure under the CDH problem assumption and show it is efficient.