From post

Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys.

, , , , , и . IACR Cryptol. ePrint Arch., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality., , , и . IACR Cryptology ePrint Archive, (2015)PUF-FSM: A Controlled Strong PUF., , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 37 (5): 1104-1108 (2018)Future Large-Scale Memristive Device Crossbar Arrays: Limits Imposed by Sneak-Path Currents on Read Operations., , , , и . CoRR, (2015)Vertical Federated Learning: Taxonomies, Threats, and Prospects., , , , , , , и . CoRR, (2023)Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables., , , , и . CoRR, (2023)MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World., , , , , , , , и . CoRR, (2022)SEDML: Securely and Efficiently Harnessing Distributed Knowledge in Machine Learning., , , , , и . CoRR, (2021)MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning., , , , , , , и . CoRR, (2022)SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh., , , , , , , , , и . CoRR, (2021)A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM., , , , , , , и . CoRR, (2022)