|

楼主 |
发表于 2025-3-17 14:54:19
|
显示全部楼层
本帖最后由 SmithArno 于 2025-3-17 15:03 编辑 " | ~8 d A, i; n; H' \, N
" a7 v% k W6 U+ [4 H) ~) K0 }
网安学院接收两篇欧密会2 m2 r& X/ g% A4 [! ]+ ]4 [5 y
6 l1 v8 d# \* K1 A& {4 s
【1】王伟嘉教授
) N/ ?5 r, t& v$ gTighter Security Notions for a Modular Approach to Private Circuits: G% W4 q$ }" t; c4 x; K7 y
Bohan Wang, Juelin Zhang, Yu Yu, Weijia Wang
1 W. N+ C S0 \1 j7 \$ dSchool of Cyber Science and Technology, Shandong University; State Key Laboratory of Cryptography and Digital Economy Security, Shandong University;
! |+ t* Q7 Y- ?$ C& l$ K" b8 N4 Q5 c9 b* m F1 [
【2】林修涵博士, [! |4 [' E* k8 \ Y. s+ I3 ^* P
Do Not Disturb a Sleeping Falcon: Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences4 I0 \+ n; d0 V, j% N
Xiuhan Lin, Mehdi Tibouchi, Yang Yu, Shiduo Zhang
, a! ~( e8 z/ f2 a% FShandong University, NTT Social Informatics Laboratories, Tsinghua University |
|