|

楼主 |
发表于 2025-3-17 14:54:19
|
显示全部楼层
本帖最后由 SmithArno 于 2025-3-17 15:03 编辑
1 m; S S& t) e2 T9 o# d+ m U6 w5 T& {4 n& _/ j$ n e3 u- I
网安学院接收两篇欧密会# _3 C- G& s7 ~; j; \
6 N" @0 X9 z+ f! x; \+ j4 T% A【1】王伟嘉教授; ]9 ?) Z8 D- \- h+ C* l& l
Tighter Security Notions for a Modular Approach to Private Circuits) I4 g& M+ D: V! Z7 b! S
Bohan Wang, Juelin Zhang, Yu Yu, Weijia Wang- V* a% P, y1 V
School of Cyber Science and Technology, Shandong University; State Key Laboratory of Cryptography and Digital Economy Security, Shandong University;/ t* Q0 c2 @" k) }: a
0 Z9 ], v* K8 B" \, C1 b【2】林修涵博士2 C, Z; P1 P- w2 E- A3 ~
Do Not Disturb a Sleeping Falcon: Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences
a3 v% X9 r8 K* o G6 uXiuhan Lin, Mehdi Tibouchi, Yang Yu, Shiduo Zhang: @5 q: {% W. I" [
Shandong University, NTT Social Informatics Laboratories, Tsinghua University |
|