FICE 发表于 2025-3-25 06:40:52
LT-Codes and Phase Transitions for Mutual Information,LDPC codes in the 1990’s , and a decade long research on their properties have brought fundamental changes to coding theory in general, and to the practical design of codes in particular. Today, a number of international standards such as DVB-S2, ITU-T G.hn, or 10 GBase-T use LDPC coanaerobic 发表于 2025-3-25 11:01:05
http://reply.papertrans.cn/47/4658/465741/465741_22.pngjustify 发表于 2025-3-25 12:43:14
Bell Inequalities: What Do We Know about Them and Why Should Cryptographers Care?, realist) protocols, but that can be violated by quantum protocols using entanglement. This talk will survey the history and present state of knowledge regarding such inequalities, with a view to their application in (quantum) cryptography.CLAMP 发表于 2025-3-25 18:03:55
http://reply.papertrans.cn/47/4658/465741/465741_24.pnghypnogram 发表于 2025-3-25 20:31:53
Some Notions of Entropy for Cryptography,ic constructions. It focuses on min-entropy and its extensions to the cases when the adversary has correlated information and/or is computationally bounded. It also presents results that can be used to bound such entropy and apply it to the analysis of cryptographic constructions.骚动 发表于 2025-3-26 03:25:29
The Round Complexity of Perfectly Secure General VSS,owed an efficient 3-round VSS for . ≥ 3. + 1 , where an infinitely powerful adversary can corrupt . (or less) parties out of . parties. This paper shows that for non-threshold adversaries:.Further as a special case of our three round protocol, we can obtain a more efficient 3-round VSS than the Vperimenopause 发表于 2025-3-26 07:57:47
Graceful Degradation in Multi-Party Computation (Extended Abstract),es runs a protocol that tolerates an adversary corrupting a subset of the participating parties, and still preserves certain security guarantees..Most MPC protocols provide security guarantees in an . fashion. In this paper, we provide the first treatment of MPC with graceful degradation of both sec赏钱 发表于 2025-3-26 12:13:24
http://reply.papertrans.cn/47/4658/465741/465741_28.pngONYM 发表于 2025-3-26 14:01:58
Using Colors to Improve Visual Cryptography for Black and White Images,l cryptography allows the sharing of color images by means of color shares. In this paper we propose a new model, called colored-black-and-white (.), in which the secret image is b&w and the shares are color images..The motivation for the use of this new model is that of constructing schemes to sharcoltish 发表于 2025-3-26 17:19:13
http://reply.papertrans.cn/47/4658/465741/465741_30.png