|

楼主 |
发表于 2025-3-17 14:54:19
|
显示全部楼层
本帖最后由 SmithArno 于 2025-3-17 15:03 编辑
- X8 U. W6 Z( O T0 ]% f8 p F2 M- q
' g; [- D* L3 ^( y: f网安学院接收两篇欧密会
+ \ _8 m( w6 e; Z* {! n% ]
7 s& W @( j: h; ~9 ]9 v【1】王伟嘉教授& v7 @/ V2 K1 P" ~* \- {0 X1 J/ A
Tighter Security Notions for a Modular Approach to Private Circuits$ z: l; P6 ]) o- S7 t
Bohan Wang, Juelin Zhang, Yu Yu, Weijia Wang
4 x2 G. n( t2 o' v4 l3 ]School of Cyber Science and Technology, Shandong University; State Key Laboratory of Cryptography and Digital Economy Security, Shandong University;
8 k1 C9 z O. D4 ~( n
/ B! u3 Y1 y. s% L$ ]【2】林修涵博士
) R; ]# o, F& p- x& X+ D" tDo Not Disturb a Sleeping Falcon: Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences$ K- S) W/ z: ?4 }2 W
Xiuhan Lin, Mehdi Tibouchi, Yang Yu, Shiduo Zhang
' f1 f3 p4 x- @6 C+ {: W/ ?Shandong University, NTT Social Informatics Laboratories, Tsinghua University |
|