碎片
发表于 2025-3-28 15:18:57
http://reply.papertrans.cn/87/8635/863448/863448_41.png
中子
发表于 2025-3-28 18:56:51
Time-Specific Encryption from Forward-Secure Encryption are practical in . aspects with regard to computational costs and data sizes. The sizes of the ciphertext and the public parameter in our schemes are significantly smaller than those in previous schemes in an asymptotic sense.
Panther
发表于 2025-3-28 23:38:12
http://reply.papertrans.cn/87/8635/863448/863448_43.png
zonules
发表于 2025-3-29 07:05:17
http://reply.papertrans.cn/87/8635/863448/863448_44.png
IST
发表于 2025-3-29 09:36:11
Multiple Differential Cryptanalysis Using , and ,, Statisticsapproaches for selecting and combining differentials are considered on a reduced version of the cipher PRESENT. We also consider the accuracy of the theoretical estimates corresponding to these attacks.
outskirts
发表于 2025-3-29 11:51:25
http://reply.papertrans.cn/87/8635/863448/863448_46.png
STEER
发表于 2025-3-29 16:09:22
Ivan Damgård,Marcel Keller,Enrique Larraia,Christian Miles,Nigel P. Smart
路标
发表于 2025-3-29 19:48:22
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Inpr scheme is based on the hardness of the learning with errors (LWE) problem which remains hard even for quantum algorithms..Furthermore, we consider deterministic identity-based public key encryption (D-IBE) in the auxiliary-input setting. The only known D-IBE scheme (without considering auxiliary i
Chandelier
发表于 2025-3-30 00:32:35
Ring Switching in BGV-Style Homomorphic Encryptions technique to work over any cyclotomic ring and show how it can be used not only for bootstrapping but also during the computation itself (in conjunction with the “packed ciphertext” techniques of Gentry, Halevi and Smart).
electrolyte
发表于 2025-3-30 04:56:08
Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptionson cost of each proof by a factor linear in the lattice dimension. Furthermore, we allow the message space to be ℤ. and the randomness distribution to be the discrete Gaussian, both of which are natural choices for the Regev encryption scheme. Finally, in our schemes there is no gap between the size