找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security and Cryptography for Networks; 8th International Co Ivan Visconti,Roberto Prisco Conference proceedings 2012 Springer-Verlag Berli

[复制链接]
楼主: ominous
发表于 2025-3-28 15:18:57 | 显示全部楼层
发表于 2025-3-28 18:56:51 | 显示全部楼层
Time-Specific Encryption from Forward-Secure Encryption are practical in . aspects with regard to computational costs and data sizes. The sizes of the ciphertext and the public parameter in our schemes are significantly smaller than those in previous schemes in an asymptotic sense.
发表于 2025-3-28 23:38:12 | 显示全部楼层
发表于 2025-3-29 07:05:17 | 显示全部楼层
发表于 2025-3-29 09:36:11 | 显示全部楼层
Multiple Differential Cryptanalysis Using , and ,, Statisticsapproaches for selecting and combining differentials are considered on a reduced version of the cipher PRESENT. We also consider the accuracy of the theoretical estimates corresponding to these attacks.
发表于 2025-3-29 11:51:25 | 显示全部楼层
发表于 2025-3-29 16:09:22 | 显示全部楼层
Ivan Damgård,Marcel Keller,Enrique Larraia,Christian Miles,Nigel P. Smart
发表于 2025-3-29 19:48:22 | 显示全部楼层
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Inpr scheme is based on the hardness of the learning with errors (LWE) problem which remains hard even for quantum algorithms..Furthermore, we consider deterministic identity-based public key encryption (D-IBE) in the auxiliary-input setting. The only known D-IBE scheme (without considering auxiliary i
发表于 2025-3-30 00:32:35 | 显示全部楼层
Ring Switching in BGV-Style Homomorphic Encryptions technique to work over any cyclotomic ring and show how it can be used not only for bootstrapping but also during the computation itself (in conjunction with the “packed ciphertext” techniques of Gentry, Halevi and Smart).
发表于 2025-3-30 04:56:08 | 显示全部楼层
Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptionson cost of each proof by a factor linear in the lattice dimension. Furthermore, we allow the message space to be ℤ. and the randomness distribution to be the discrete Gaussian, both of which are natural choices for the Regev encryption scheme. Finally, in our schemes there is no gap between the size
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 22:42
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表