collagen 发表于 2025-3-25 04:59:54

http://reply.papertrans.cn/47/4675/467479/467479_21.png

导师 发表于 2025-3-25 10:37:43

http://reply.papertrans.cn/47/4675/467479/467479_22.png

难取悦 发表于 2025-3-25 11:55:16

http://reply.papertrans.cn/47/4675/467479/467479_23.png

scotoma 发表于 2025-3-25 17:45:24

http://reply.papertrans.cn/47/4675/467479/467479_24.png

饮料 发表于 2025-3-25 20:58:29

http://reply.papertrans.cn/47/4675/467479/467479_25.png

英寸 发表于 2025-3-26 03:42:34

Approach to Cryptography from Differential Geometry with Example,Then we construct an example of the map over the real numbers. By quantization, we propose a public-key encryption scheme. The scheme is proved to be IND-CCA2 secure under the new assumption of the decisional linear parallel displacement problem.

委派 发表于 2025-3-26 06:01:30

On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management,can be used as a potential privacy-preserving technique. The current work looks at the existing libraries that implement zk-SNARKs and zk-STARKs and exemplifies and discusses the use of zk-SNARKs in blockchain-based identity management solutions.

flamboyant 发表于 2025-3-26 08:39:25

http://reply.papertrans.cn/47/4675/467479/467479_28.png

畏缩 发表于 2025-3-26 13:01:46

http://reply.papertrans.cn/47/4675/467479/467479_29.png

MAIM 发表于 2025-3-26 18:15:03

http://reply.papertrans.cn/47/4675/467479/467479_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Innovative Security Solutions for Information Technology and Communications; 13th International C Diana Maimut,Andrei-George Oprina,Damien