AES-128 under HHL algorithm. | 0 | 0.34 | 2022 |
Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice | 0 | 0.34 | 2022 |
Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak. | 0 | 0.34 | 2022 |
On the Invalidity of Lin16/Lin17 Obfuscation Schemes. | 0 | 0.34 | 2022 |
Improved Pump and Jump BKZ by Sharp Simulator. | 0 | 0.34 | 2022 |
On the Security Proof of CKO+21 Secret Sharing Scheme. | 0 | 0.34 | 2022 |
Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting. | 0 | 0.34 | 2022 |
Notes on Reusable Garbling. | 0 | 0.34 | 2022 |
Improved Progressive BKZ with Lattice Sieving. | 0 | 0.34 | 2022 |
P/poly Invalidity of the Agr17 Functional Encryption Scheme. | 0 | 0.34 | 2021 |
A Note on P/poly Validity of GVW15 Predicate Encryption Scheme. | 0 | 0.34 | 2021 |
PEPFL: A Framework for a Practical and Efficient Privacy-Preserving Federated Learning. | 0 | 0.34 | 2021 |