An Improvement of Multi-exponentiation with Encrypted Bases Argument: Smaller and Faster

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Inscrypt (16. : 2020 : Online) Information security and cryptology
1. Verfasser: Liu, Yi (VerfasserIn)
Weitere Verfasser: Wang, Qi (VerfasserIn), Yiu, Siu-Ming (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning 2021 Su, Heng-Chuan
Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack 2021 Jia, Bowei
An Efficient CCA-Secure Access Control Encryption for Any Policy 2021 Tan, Gaosheng
DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation 2021 Chen, Jinyin
CSURF-TWO: CSIDH for the Ratio (2 : 1) 2021 Fan, Xuejun
WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentation 2021 Chen, Tieming
P2A: Privacy Preserving Anonymous Authentication Based on Blockchain and SGX 2021 Song, Tianlin
A Distinguisher for RNGs with LFSR Post-processing 2021 Wu, Xinying
Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications 2021 Liang, Zhichuang
An Improvement of Multi-exponentiation with Encrypted Bases Argument: Smaller and Faster 2021 Liu, Yi
Symmetric 2-Adic Complexity of Ding-Helleseth Generalized Cyclotomic Sequences of Period pq 2021 Edemskiy, Vladimir
On the k-Error Linear Complexities of De Bruijn Sequences 2021 Li, Ming
A Lattice-Based Fully Dynamic Group Signature Scheme Without NIZK 2021 Sun, Yiru
An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System 2021 Chen, Zhaojie
Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption 2021 Liu, Yanyan
Chosen Ciphertext Attacks Secure Inner-Product Functional Encryption from Learning with Errors Assumption 2021 Yun, Kelly
Bagua: A NFSR-Based Stream Cipher Constructed Following Confusion and Diffusion Principles 2021 Tan, Lin
Public Verifiable Private Decision Tree Prediction 2021 Wang, Hailong
Group Key Exchange Protocols from Supersingular Isogenies 2021 Fan, Xuejun
An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm 2021 Zhang, Yudi
Alle Artikel auflisten