碎片 发表于 2025-3-28 15:18:57
http://reply.papertrans.cn/87/8635/863448/863448_41.png中子 发表于 2025-3-28 18:56:51
Time-Specific Encryption from Forward-Secure Encryption are practical in . aspects with regard to computational costs and data sizes. The sizes of the ciphertext and the public parameter in our schemes are significantly smaller than those in previous schemes in an asymptotic sense.Panther 发表于 2025-3-28 23:38:12
http://reply.papertrans.cn/87/8635/863448/863448_43.pngzonules 发表于 2025-3-29 07:05:17
http://reply.papertrans.cn/87/8635/863448/863448_44.pngIST 发表于 2025-3-29 09:36:11
Multiple Differential Cryptanalysis Using , and ,, Statisticsapproaches for selecting and combining differentials are considered on a reduced version of the cipher PRESENT. We also consider the accuracy of the theoretical estimates corresponding to these attacks.outskirts 发表于 2025-3-29 11:51:25
http://reply.papertrans.cn/87/8635/863448/863448_46.pngSTEER 发表于 2025-3-29 16:09:22
Ivan Damgård,Marcel Keller,Enrique Larraia,Christian Miles,Nigel P. Smart路标 发表于 2025-3-29 19:48:22
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Inpr scheme is based on the hardness of the learning with errors (LWE) problem which remains hard even for quantum algorithms..Furthermore, we consider deterministic identity-based public key encryption (D-IBE) in the auxiliary-input setting. The only known D-IBE scheme (without considering auxiliary iChandelier 发表于 2025-3-30 00:32:35
Ring Switching in BGV-Style Homomorphic Encryptions technique to work over any cyclotomic ring and show how it can be used not only for bootstrapping but also during the computation itself (in conjunction with the “packed ciphertext” techniques of Gentry, Halevi and Smart).electrolyte 发表于 2025-3-30 04:56:08
Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptionson cost of each proof by a factor linear in the lattice dimension. Furthermore, we allow the message space to be ℤ. and the randomness distribution to be the discrete Gaussian, both of which are natural choices for the Regev encryption scheme. Finally, in our schemes there is no gap between the size