找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information and Communications Security; 25th International C Ding Wang,Moti Yung,Xiaofeng Chen Conference proceedings 2023 The Editor(s) (

[复制链接]
楼主: Sparkle
发表于 2025-3-25 05:59:28 | 显示全部楼层
d to the scientific community, being its use in the industry far from being a reality. This chapter presents the concept of cyclostationarity, its terminology and its relation with traditional signal processing tools in a descriptive way. Two examples of real data analysis from the cyclostationary v
发表于 2025-3-25 11:21:09 | 显示全部楼层
发表于 2025-3-25 15:13:52 | 显示全部楼层
发表于 2025-3-25 18:16:50 | 显示全部楼层
发表于 2025-3-25 21:45:00 | 显示全部楼层
: Towards More Efficient and BBB-Secure AE from a Single Public Permutationed AE scheme that employs a public permutation and one call to an XOR-universal hash function. . provides .(2./3)-bit security and high throughput by combining forked public-permutation-based variants of . and Encrypted Davies-Meyer. Thus, it can use a single, in part round-reduced, public permutati
发表于 2025-3-26 02:29:47 | 显示全部楼层
A Polynomial-Time Attack on G2SIDHattack algorithms that can recover the secret key in polynomial time. Our paper demonstrates the differences between isogenies in dimension one and higher dimensions, and illustrates that all high-dimensional SIDH protocols are insecure.
发表于 2025-3-26 06:23:23 | 显示全部楼层
Improvements of Homomorphic Secure Evaluation of Inverse Square Rootvement of efficiency. The Taylor expansion method greatly reduces the initial value calculation consumption, but appropriately increases the number of Newton iterations. Compared with the Taylor expansion method, the rational function method is more costly in the initial value calculation stage but
发表于 2025-3-26 09:41:19 | 显示全部楼层
Semi-Honest 2-Party Faithful Truncation from Two-Bit Extractionplexity..This efficiency improvement is due to the fact that we reuse the intermediate results of eliminating the big error to further eliminate the small error. Our reuse strategy is effective, as it shows that while eliminating the big error, it is possible to further eliminate the small error at
发表于 2025-3-26 15:37:14 | 显示全部楼层
Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography.g., mobile, laptop, etc.) would be able to evaluate and verify the output over a large field while the security conditions are preserved. Our protocol maintains the security against a static active adversary corrupting a coalition of up to . servers and the opposed party. The main two parties commi
发表于 2025-3-26 17:06:57 | 显示全部楼层
Xuanyu Liang,Yincen Chen,Ling Song,Qianqian Yang,Zhuohui Feng,Tianrong Huang
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-16 05:39
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表