Bernstein-test
发表于 2025-3-23 12:34:22
S. P. McGrathising candidates to ensure post-quantum security, symmetric-key primitives, in particular the recent MPC/FHE/ZK-friendly hash functions or block ciphers, are providing another choice to build efficient and secure signature schemes that do not rely on any assumed hard problems. However, considering t
昏睡中
发表于 2025-3-23 13:52:57
D. E. Baker,J. P. Senfthat the delegation framework, introduced by Karakostas . (SCN’20) to provide a delegation framework, can be extended and repurposed to construct a trust layer over a PoS consensus protocol in addition to its original application. Furthermore, we show a concrete reputation system satisfying the posit
不易燃
发表于 2025-3-23 18:37:00
K. A. Smith,J. E. Patersondata under a public key setting. In this cryptographic primitive, senders can generate searchable ciphertexts for specific keywords to be retrieved from a given document; receivers can generate corresponding trapdoors for search by using their private keys. Recently, Jiang . (ACISP’ 16) proposed an
GLUE
发表于 2025-3-24 01:51:32
E. Steinnesely used Instant-Messaging (IM) applications (such as Signal, WhatsApp, Apple’s iMessage, and Telegram) claim to provide an E2EE functionality. However, a recent technique called client-side scanning (CSS), which could be implemented by these IM applications, makes these E2EE claims grandiose and ho
发源
发表于 2025-3-24 04:08:16
http://reply.papertrans.cn/87/8623/862261/862261_15.png
Herbivorous
发表于 2025-3-24 07:00:21
L. Kiekensugh middleboxes have the advantage of not being dependent on specific hardware and being able to provide a variety of services, they can become a new attack target for hackers. Therefore, many researchers have proposed security-enchanced TLS protocols, but their results have some limitations. In thi
geometrician
发表于 2025-3-24 11:34:30
http://reply.papertrans.cn/87/8623/862261/862261_17.png
investigate
发表于 2025-3-24 17:04:57
otentially replacing standards such as RSA and ECC, as it is designed to withstand attacks using quantum computers. In South Korea, there is an ongoing standardization effort called the KpqC (Korean Post-Quantum Cryptography) competition for developing post-quantum cryptography as a national standar
inconceivable
发表于 2025-3-24 21:45:13
http://reply.papertrans.cn/87/8623/862261/862261_19.png
常到
发表于 2025-3-25 02:13:25
http://reply.papertrans.cn/87/8623/862261/862261_20.png