collagen 发表于 2025-3-25 04:59:54
http://reply.papertrans.cn/47/4675/467479/467479_21.png导师 发表于 2025-3-25 10:37:43
http://reply.papertrans.cn/47/4675/467479/467479_22.png难取悦 发表于 2025-3-25 11:55:16
http://reply.papertrans.cn/47/4675/467479/467479_23.pngscotoma 发表于 2025-3-25 17:45:24
http://reply.papertrans.cn/47/4675/467479/467479_24.png饮料 发表于 2025-3-25 20:58:29
http://reply.papertrans.cn/47/4675/467479/467479_25.png英寸 发表于 2025-3-26 03:42:34
Approach to Cryptography from Differential Geometry with Example,Then we construct an example of the map over the real numbers. By quantization, we propose a public-key encryption scheme. The scheme is proved to be IND-CCA2 secure under the new assumption of the decisional linear parallel displacement problem.委派 发表于 2025-3-26 06:01:30
On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management,can be used as a potential privacy-preserving technique. The current work looks at the existing libraries that implement zk-SNARKs and zk-STARKs and exemplifies and discusses the use of zk-SNARKs in blockchain-based identity management solutions.flamboyant 发表于 2025-3-26 08:39:25
http://reply.papertrans.cn/47/4675/467479/467479_28.png畏缩 发表于 2025-3-26 13:01:46
http://reply.papertrans.cn/47/4675/467479/467479_29.pngMAIM 发表于 2025-3-26 18:15:03
http://reply.papertrans.cn/47/4675/467479/467479_30.png