Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
To label, or not to label (in generic groups)
M Zhandry - Annual International Cryptology Conference, 2022 - Springer
Generic groups are an important tool for analyzing the feasibility and in-feasibility of group-
based cryptosystems. There are two distinct wide-spread versions of generic groups …
based cryptosystems. There are two distinct wide-spread versions of generic groups …
The many faces of schnorr
V Shoup - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Recently, a number of highly optimized threshold signing protocols for Schnorr signatures
have been proposed. While these proposals contain important new techniques, some of …
have been proposed. While these proposals contain important new techniques, some of …
Generic-group lower bounds via reductions between geometric-search problems: With and without preprocessing
The generic-group model (GGM) aims to capture algorithms working over groups of prime
order that only rely on the group operation, but do not exploit any additional structure given …
order that only rely on the group operation, but do not exploit any additional structure given …
Preprocessing Security in Multiple Idealized Models with Applications to Schnorr Signatures and PSEC-KEM
J Blocki, S Lee - Cryptology ePrint Archive, 2025 - eprint.iacr.org
In modern cryptography, relatively few instantiations of foundational cryptographic primitives
are used across most cryptographic protocols. For example, elliptic curve groups are …
are used across most cryptographic protocols. For example, elliptic curve groups are …
Truncator: time-space tradeoff of cryptographic primitives
We present mining-based techniques to reduce the size of various cryptographic outputs
without loss of security. Our approach can be generalized for multiple primitives, such as …
without loss of security. Our approach can be generalized for multiple primitives, such as …
Computationally relaxed locally decodable codes, revisited
We revisit computationally relaxed locally decodable codes (crLDCs)(Blocki et al., Trans. Inf.
Theory'21) and give two new constructions. Our first construction is a Hamming crLDC that is …
Theory'21) and give two new constructions. Our first construction is a Hamming crLDC that is …
An Authorizable Threshold Signature Scheme for Secure Sharing and Mining of Power IoT Data
W Chen, XT Xu, C Hou, RX Gao, GL Si… - 2024 International …, 2024 - ieeexplore.ieee.org
The rapid development and wide popularity of electric power IoT has brought convenience
to people's daily lives. Comprehensive informatization and intelligent transformation of the …
to people's daily lives. Comprehensive informatization and intelligent transformation of the …
Exploring the Composition of Coding Theory and Cryptography Through Secure Computation, Succinct Arguments, and Local Codes
AR Block - 2022 - search.proquest.com
We examine new ways in which coding theory and cryptography continue to be composed
together, and show that the composition of these two fields yield new constructions in the …
together, and show that the composition of these two fields yield new constructions in the …