无孔 发表于 2025-3-25 05:59:28

d to the scientific community, being its use in the industry far from being a reality. This chapter presents the concept of cyclostationarity, its terminology and its relation with traditional signal processing tools in a descriptive way. Two examples of real data analysis from the cyclostationary v

hegemony 发表于 2025-3-25 11:21:09

http://reply.papertrans.cn/47/4659/465897/465897_22.png

盘旋 发表于 2025-3-25 15:13:52

http://reply.papertrans.cn/47/4659/465897/465897_23.png

边缘 发表于 2025-3-25 18:16:50

http://reply.papertrans.cn/47/4659/465897/465897_24.png

雄伟 发表于 2025-3-25 21:45:00

: Towards More Efficient and BBB-Secure AE from a Single Public Permutationed AE scheme that employs a public permutation and one call to an XOR-universal hash function. . provides .(2./3)-bit security and high throughput by combining forked public-permutation-based variants of . and Encrypted Davies-Meyer. Thus, it can use a single, in part round-reduced, public permutati

amputation 发表于 2025-3-26 02:29:47

A Polynomial-Time Attack on G2SIDHattack algorithms that can recover the secret key in polynomial time. Our paper demonstrates the differences between isogenies in dimension one and higher dimensions, and illustrates that all high-dimensional SIDH protocols are insecure.

转折点 发表于 2025-3-26 06:23:23

Improvements of Homomorphic Secure Evaluation of Inverse Square Rootvement of efficiency. The Taylor expansion method greatly reduces the initial value calculation consumption, but appropriately increases the number of Newton iterations. Compared with the Taylor expansion method, the rational function method is more costly in the initial value calculation stage but

阻碍 发表于 2025-3-26 09:41:19

Semi-Honest 2-Party Faithful Truncation from Two-Bit Extractionplexity..This efficiency improvement is due to the fact that we reuse the intermediate results of eliminating the big error to further eliminate the small error. Our reuse strategy is effective, as it shows that while eliminating the big error, it is possible to further eliminate the small error at

Anhydrous 发表于 2025-3-26 15:37:14

Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography.g., mobile, laptop, etc.) would be able to evaluate and verify the output over a large field while the security conditions are preserved. Our protocol maintains the security against a static active adversary corrupting a coalition of up to . servers and the opposed party. The main two parties commi

Interstellar 发表于 2025-3-26 17:06:57

Xuanyu Liang,Yincen Chen,Ling Song,Qianqian Yang,Zhuohui Feng,Tianrong Huang
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Information and Communications Security; 25th International C Ding Wang,Moti Yung,Xiaofeng Chen Conference proceedings 2023 The Editor(s) (