名字 发表于 2025-3-30 10:03:22
http://reply.papertrans.cn/47/4658/465746/465746_51.png大炮 发表于 2025-3-30 13:29:51
http://reply.papertrans.cn/47/4658/465746/465746_52.pngconifer 发表于 2025-3-30 19:55:07
On the Security of Pseudorandomized Information-Theoretically Secure Schemes in a protocol can be replaced with pseudorandomness in an indistinguishable way for an adversary even if his algorithm has unbounded complexity. However, their argument was applied only to some special protocols. In this article, we first show that their argument is not effective for a wide class oSlit-Lamp 发表于 2025-3-31 00:28:21
http://reply.papertrans.cn/47/4658/465746/465746_54.png不能根除 发表于 2025-3-31 01:26:14
On the Optimization of Bipartite Secret Sharing Schemesrticipants in each part play an equivalent role. The bipartite access structures that admit an ideal secret sharing scheme have been characterized, but it is not known which is the optimal complexity of non-ideal bipartite access structures. By using the connection between secret sharing schemes and解脱 发表于 2025-3-31 05:42:10
http://reply.papertrans.cn/47/4658/465746/465746_56.pngmeditation 发表于 2025-3-31 10:14:34
http://reply.papertrans.cn/47/4658/465746/465746_57.png进入 发表于 2025-3-31 14:31:53
http://reply.papertrans.cn/47/4658/465746/465746_58.png流动性 发表于 2025-3-31 17:47:42
Cryptanalysis of Secure Message Transmission Protocols with Feedbackceiver to the sender can be used to reduce the requirements of network connectivity. We observe that the way how feedbacks were used in previous work does not guarantee perfect privacy to the transmitted message, when the adversary performs a .. In this paper, we shall describe our new Guessing Attaambivalence 发表于 2025-4-1 00:21:42
http://reply.papertrans.cn/47/4658/465746/465746_60.png