找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cryptography and Coding; 15th IMA Internation Jens Groth Conference proceedings 2015 Springer International Publishing Switzerland 2015 Aut

[复制链接]
楼主: SCOWL
发表于 2025-3-28 14:53:10 | 显示全部楼层
Is what you ask for what you get?,-Levin extractor; these outperform the previous constructions in terms of public-key size and reduction tightness, as well as enjoying CCA security. Finally, we also point out that our approach leads to an elegant construction for Correlation Input Secure hash functions, which have proven to be a versatile tool in diverse areas of cryptography.
发表于 2025-3-28 22:00:30 | 显示全部楼层
发表于 2025-3-29 02:30:55 | 显示全部楼层
Is what you ask for what you get?,es into a protocol secure against malicious adversaries in the LUC framework; (ii) We consider the application of our compiler to oblivious transfer (OT) protocols, by which we obtain a construction of OT meeting both UC security and game-theoretic security.
发表于 2025-3-29 07:09:52 | 显示全部楼层
Security Against Related Randomness Attacks via Reconstructive Extractors-Levin extractor; these outperform the previous constructions in terms of public-key size and reduction tightness, as well as enjoying CCA security. Finally, we also point out that our approach leads to an elegant construction for Correlation Input Secure hash functions, which have proven to be a versatile tool in diverse areas of cryptography.
发表于 2025-3-29 08:09:56 | 显示全部楼层
MI-T-HFE, A New Multivariate Signature Schemeing for a few major signature schemes, including QUARTZ. A practical parameter set is proposed for MI-T-HFE with the same length of message and same level of security as QUARTZ, but it has smaller public key size, and is more efficient than (the underlying HFEv- of) QUARTZ with the only cost that its signature length is twice that of QUARTZ.
发表于 2025-3-29 14:38:05 | 显示全部楼层
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application toes into a protocol secure against malicious adversaries in the LUC framework; (ii) We consider the application of our compiler to oblivious transfer (OT) protocols, by which we obtain a construction of OT meeting both UC security and game-theoretic security.
发表于 2025-3-29 18:51:24 | 显示全部楼层
发表于 2025-3-29 22:10:15 | 显示全部楼层
发表于 2025-3-30 02:25:44 | 显示全部楼层
Conference proceedings 2015 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience
发表于 2025-3-30 04:51:11 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-1 02:54
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表