Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Mar 2, 2022 · Abstract. Achieving adaptive (or proactive) security in cryptographic protocols is notoriously difficult due to the adversary's power to ...
Jan 25, 2023 · In this work we design schemes for role assignment that are not only efficient in sending messages to parties selected in the future but also ...
In this work we design schemes for role assignment that are not only efficient in sending messages to parties selected in the future but also amenable to the ...
Jan 25, 2023 · Achieving adaptive (or proactive) security in cryptographic protocols is notoriously difficult due to the adversary's power to dynamically ...
... The proposed driver drowsiness monitoring system employs the YOLO architecture, which divides images into a grid network for object detection (Figure 2).
Jan 23, 2023 · YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model. Ignacio Cascudo, Bernardo David, Lydia Garms, Anders Konring.
TL;DR: In this paper , the authors proposed a simple and efficient scheme for encrypting messages towards randomly and anonymously selected parties, ...
YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model. Advances in Cryptology - ASIACRYPT 2022 -28th International Conference on the ...