Login / Signup
Polynomial Commitments from Lattices: Post-quantum Security, Fast Verification and Transparent Setup.
Valerio Cini
Giulio Malavolta
Ngoc Khanh Nguyen
Hoeteck Wee
Published in:
CRYPTO (10) (2024)
Keyphrases
</>
channel capacity
high security
integrity verification
java card
security issues
cryptographic protocols
security problems
security requirements
formal verification
access control
model checking
security systems
computer security
security analysis
intrusion detection
security mechanisms
information assurance
face verification
statistical databases
security level
security policies
smart card
information security
image encryption
security properties
multiagent systems
security threats
network security
security protocols
formal analysis
encryption scheme