- 博客(9)
- 收藏
- 关注
转载 密码学进展- Crypto16
A subfield lattice attack on overstretched NTRU assumptionsMartin R. Albrecht; Shi Bai; Léo Ducas -Information Security Group, Royal Holloway University of London, UK; ENS de Lyon, Laboratoire LIP, F
2016-06-26 23:53:07
1651
原创 SHA-3
简介SHA-3 (Secure Hash Algorithm 3), a subset of the cryptographic primitive family Keccak, is a cryptographic hash function designed by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche
2016-06-21 01:02:48
880
转载 Top 10 Ways to Perfect Your Daily Routine with the Power of Science
ways of life
2016-06-21 00:39:55
430
原创 Oblivious transfer and Garbled circuits
Oblivious transferOT是指发送方sender传输给接收方receiver n个数据,但是不知道receiver收到了n中的哪一个,而receiver也只能解码其中一个。假如需要k个数据,那么至少需要k次interaction。 In cryptography, an oblivious transfer protocol (often abbreviated OT) is a
2016-06-20 19:18:43
2554
原创 同态加密 Homomorphic Encryption
技术进展-Gentry 原始版本 somewhat HE+bootstrapping -第二代:Leveled somewhat HE(modulus switching) + bootstrapping -BGV(for high degree polynomials), NTRU -scale-invariant: FV, YASHE(for low level, large plai
2016-06-20 17:56:57
2802
转载 Special Encryption- Functional /Attribute-based/ID-based
Special Encryption- Functional /Attribute-based/ID-based Functional
2016-06-20 17:30:57
574
空空如也
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人