无孔 发表于 2025-3-25 05:59:28
d to the scientific community, being its use in the industry far from being a reality. This chapter presents the concept of cyclostationarity, its terminology and its relation with traditional signal processing tools in a descriptive way. Two examples of real data analysis from the cyclostationary vhegemony 发表于 2025-3-25 11:21:09
http://reply.papertrans.cn/47/4659/465897/465897_22.png盘旋 发表于 2025-3-25 15:13:52
http://reply.papertrans.cn/47/4659/465897/465897_23.png边缘 发表于 2025-3-25 18:16:50
http://reply.papertrans.cn/47/4659/465897/465897_24.png雄伟 发表于 2025-3-25 21:45:00
: Towards More Efficient and BBB-Secure AE from a Single Public Permutationed AE scheme that employs a public permutation and one call to an XOR-universal hash function. . provides .(2./3)-bit security and high throughput by combining forked public-permutation-based variants of . and Encrypted Davies-Meyer. Thus, it can use a single, in part round-reduced, public permutatiamputation 发表于 2025-3-26 02:29:47
A Polynomial-Time Attack on G2SIDHattack algorithms that can recover the secret key in polynomial time. Our paper demonstrates the differences between isogenies in dimension one and higher dimensions, and illustrates that all high-dimensional SIDH protocols are insecure.转折点 发表于 2025-3-26 06:23:23
Improvements of Homomorphic Secure Evaluation of Inverse Square Rootvement of efficiency. The Taylor expansion method greatly reduces the initial value calculation consumption, but appropriately increases the number of Newton iterations. Compared with the Taylor expansion method, the rational function method is more costly in the initial value calculation stage but阻碍 发表于 2025-3-26 09:41:19
Semi-Honest 2-Party Faithful Truncation from Two-Bit Extractionplexity..This efficiency improvement is due to the fact that we reuse the intermediate results of eliminating the big error to further eliminate the small error. Our reuse strategy is effective, as it shows that while eliminating the big error, it is possible to further eliminate the small error atAnhydrous 发表于 2025-3-26 15:37:14
Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography.g., mobile, laptop, etc.) would be able to evaluate and verify the output over a large field while the security conditions are preserved. Our protocol maintains the security against a static active adversary corrupting a coalition of up to . servers and the opposed party. The main two parties commiInterstellar 发表于 2025-3-26 17:06:57
Xuanyu Liang,Yincen Chen,Ling Song,Qianqian Yang,Zhuohui Feng,Tianrong Huang