curriculum 发表于 2025-3-30 10:43:30
,Breaking GEA-Like Stream Ciphers with Lower Time Cost,ted. All these attacks have been confirmed by experimental results on a common PC. The cryptanalytic results show that the initializations of all GEA-like stream ciphers are far from being optimal and need to be strengthened.发起 发表于 2025-3-30 14:13:11
Efficient Large-Scale Multi-party Computation Based on Garbled Circuit, circuit, where parties generate a garbled circuit based on the related path in the circuit rather than the entire circuit. Through experimental evaluation and comparison with related work, the proposed scheme demonstrates dramatic improvement in computation and communication efficiency for each party when the number of parties increases.AWE 发表于 2025-3-30 18:06:12
http://reply.papertrans.cn/48/4762/476106/476106_53.pngnurture 发表于 2025-3-31 00:43:18
Yujing Liu,Jiangbin Chen,Shuhui Chen is a particular emphasis on understanding the problems of ethical regulations and practice in the institutional and social context of research. A glossary and numerous text boxes explaining relevant terms and 978-3-642-42719-0978-3-642-23699-0arthrodesis 发表于 2025-3-31 01:11:26
http://reply.papertrans.cn/48/4762/476106/476106_55.png女上瘾 发表于 2025-3-31 05:44:31
,Secure Federated Distillation Framework for Encrypted Traffic Classification,taset ISCX CICDarknet2020 and real dataset DarkCSE2023 containing popular application traffic, including VPN and Tor. Experiments show that our proposed framework achieves precision of . and recall of . in centralized setting, precision of ., and recall of . in federated setting, which is superior tcinder 发表于 2025-3-31 11:21:20
http://reply.papertrans.cn/48/4762/476106/476106_57.pngCounteract 发表于 2025-3-31 17:14:03
,Shrinkable Ring Signatures: It Wasn’t Them!,igned signature is actually on behalf of a smaller ring than the original one. We also formalize the syntax and security models for SRS. In terms of construction, we design a generic framework for an SRS from a Merkle-tree-based accumulator, a collision-resistant one-way function, a public key encry者变 发表于 2025-3-31 17:53:56
http://reply.papertrans.cn/48/4762/476106/476106_59.pnginculpate 发表于 2025-3-31 23:16:41
,Isogeny-Based Password-Authenticated Key Exchange Based on Shuffle Algorithm,ll prevent trivial attacks using twists. Due to the use of Merkle root and password in the shuffle function, the attackers cannot select a message from the received message. Also, the length of the message used for key derivation is reduced from . to .. We prove the security based on the security as