碎片 发表于 2025-3-28 15:18:57

http://reply.papertrans.cn/87/8635/863448/863448_41.png

中子 发表于 2025-3-28 18:56:51

Time-Specific Encryption from Forward-Secure Encryption are practical in . aspects with regard to computational costs and data sizes. The sizes of the ciphertext and the public parameter in our schemes are significantly smaller than those in previous schemes in an asymptotic sense.

Panther 发表于 2025-3-28 23:38:12

http://reply.papertrans.cn/87/8635/863448/863448_43.png

zonules 发表于 2025-3-29 07:05:17

http://reply.papertrans.cn/87/8635/863448/863448_44.png

IST 发表于 2025-3-29 09:36:11

Multiple Differential Cryptanalysis Using , and ,, Statisticsapproaches for selecting and combining differentials are considered on a reduced version of the cipher PRESENT. We also consider the accuracy of the theoretical estimates corresponding to these attacks.

outskirts 发表于 2025-3-29 11:51:25

http://reply.papertrans.cn/87/8635/863448/863448_46.png

STEER 发表于 2025-3-29 16:09:22

Ivan Damgård,Marcel Keller,Enrique Larraia,Christian Miles,Nigel P. Smart

路标 发表于 2025-3-29 19:48:22

Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Inpr scheme is based on the hardness of the learning with errors (LWE) problem which remains hard even for quantum algorithms..Furthermore, we consider deterministic identity-based public key encryption (D-IBE) in the auxiliary-input setting. The only known D-IBE scheme (without considering auxiliary i

Chandelier 发表于 2025-3-30 00:32:35

Ring Switching in BGV-Style Homomorphic Encryptions technique to work over any cyclotomic ring and show how it can be used not only for bootstrapping but also during the computation itself (in conjunction with the “packed ciphertext” techniques of Gentry, Halevi and Smart).

electrolyte 发表于 2025-3-30 04:56:08

Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptionson cost of each proof by a factor linear in the lattice dimension. Furthermore, we allow the message space to be ℤ. and the randomness distribution to be the discrete Gaussian, both of which are natural choices for the Regev encryption scheme. Finally, in our schemes there is no gap between the size
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Security and Cryptography for Networks; 8th International Co Ivan Visconti,Roberto Prisco Conference proceedings 2012 Springer-Verlag Berli