Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] A survey of homomorphic encryption for nonspecialists
C Fontaine, F Galand - EURASIP Journal on Information Security, 2007 - Springer
Processing encrypted signals requires special properties of the underlying encryption
scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose …
scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose …
A survey of public-key cryptographic primitives in wireless sensor networks
KA Shim - IEEE Communications Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Cryptographic primitives are fundamental building blocks for designing security protocols to
achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say …
achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say …
Fast multiparty threshold ECDSA with fast trustless setup
R Gennaro, S Goldfeder - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
A threshold signature scheme enables distributed signing among n players such that any
subgroup of size t+1 can sign, whereas any group with t or fewer players cannot. While there …
subgroup of size t+1 can sign, whereas any group with t or fewer players cannot. While there …
Doubly-efficient zkSNARKs without trusted setup
We present a zero-knowledge argument for NP with low communication complexity, low
concrete cost for both the prover and the verifier, and no trusted setup, based on standard …
concrete cost for both the prover and the verifier, and no trusted setup, based on standard …
[PDF][PDF] A graduate course in applied cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
Trapdoors for lattices: Simpler, tighter, faster, smaller
D Micciancio, C Peikert - Annual International Conference on the Theory …, 2012 - Springer
We give new methods for generating and using “strong trapdoors” in cryptographic lattices,
which are simultaneously simple, efficient, easy to implement (even in parallel), and …
which are simultaneously simple, efficient, easy to implement (even in parallel), and …
[CARTE][B] A fully homomorphic encryption scheme
C Gentry - 2009 - search.proquest.com
We propose the first fully homomorphic encryption scheme, solving an old open problem.
Such a scheme allows one to compute arbitrary functions over encrypted data without the …
Such a scheme allows one to compute arbitrary functions over encrypted data without the …
Lattice cryptography for the internet
C Peikert - International workshop on post-quantum cryptography, 2014 - Springer
In recent years, lattice-based cryptography has been recognized for its many attractive
properties, such as strong provable security guarantees and apparent resistance to quantum …
properties, such as strong provable security guarantees and apparent resistance to quantum …
Charm: a framework for rapidly prototy** cryptosystems
We describe Charm, an extensible framework for rapidly prototy** cryptographic systems.
Charm provides a number of features that explicitly support the development of new …
Charm provides a number of features that explicitly support the development of new …
Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security
While threshold signature schemes have been presented before, there has never been an
optimal threshold signature algorithm for DSA. The properties of DSA make it quite …
optimal threshold signature algorithm for DSA. The properties of DSA make it quite …