|

楼主 |
发表于 2025-3-17 14:54:19
|
显示全部楼层
本帖最后由 SmithArno 于 2025-3-17 15:03 编辑
' g$ l0 C+ J! k) S6 Z1 v, C0 q% _$ Z6 _* S; \. X* t1 ~7 }
网安学院接收两篇欧密会
# ?9 ^$ O0 |- a# N. n- |% T) g- e- T; d! _& A0 f! \
【1】王伟嘉教授' s" X: Q( x2 d, q; f' d% H/ Z E
Tighter Security Notions for a Modular Approach to Private Circuits; J3 R# i0 P3 a$ |$ Z% w
Bohan Wang, Juelin Zhang, Yu Yu, Weijia Wang
# @: i1 ]9 o" J0 v+ ESchool of Cyber Science and Technology, Shandong University; State Key Laboratory of Cryptography and Digital Economy Security, Shandong University;* m" S& N* H. a( W2 |- C0 l
$ C0 C3 k. M. ]- @
【2】林修涵博士
9 G1 \0 x p3 y3 }. P6 g' qDo Not Disturb a Sleeping Falcon: Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences9 r& ?& H2 F( j8 `4 X$ C
Xiuhan Lin, Mehdi Tibouchi, Yang Yu, Shiduo Zhang
2 V/ {$ h* V" r1 VShandong University, NTT Social Informatics Laboratories, Tsinghua University |
|