標(biāo)題: Titlebook: Applied Cryptography and Network Security; 17th International C Robert H. Deng,Valérie Gauthier-Uma?a,Moti Yung Conference proceedings 2019 [打印本頁] 作者: 營養(yǎng)品 時間: 2025-3-21 18:46
書目名稱Applied Cryptography and Network Security影響因子(影響力)
書目名稱Applied Cryptography and Network Security影響因子(影響力)學(xué)科排名
書目名稱Applied Cryptography and Network Security網(wǎng)絡(luò)公開度
書目名稱Applied Cryptography and Network Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Applied Cryptography and Network Security被引頻次
書目名稱Applied Cryptography and Network Security被引頻次學(xué)科排名
書目名稱Applied Cryptography and Network Security年度引用
書目名稱Applied Cryptography and Network Security年度引用學(xué)科排名
書目名稱Applied Cryptography and Network Security讀者反饋
書目名稱Applied Cryptography and Network Security讀者反饋學(xué)科排名
作者: 兩種語言 時間: 2025-3-21 23:23
Engineering for a Finite Planeth standard lattice, as a proof of concept, and NTRU lattice, as an efficient instantiation. We show that the latter construction, called ., is almost as efficient as the classical RST ring signatures and thus may be of practical interest.作者: Cabg318 時間: 2025-3-22 02:31 作者: Asymptomatic 時間: 2025-3-22 04:39
Re: What’s Up Johnny?ed into signing arbitrary text by replying to emails containing CSS conditional rules. An evaluation shows that 17 out of 19 OpenPGP-capable email clients, as well as 21 out of 22 clients supporting S/MIME, are vulnerable to at least one attack. We provide different countermeasures and discuss their advantages and disadvantages.作者: 極大痛苦 時間: 2025-3-22 12:46 作者: 值得尊敬 時間: 2025-3-22 14:17
A Modular Hybrid Learning Approach for Black-Box Security Testing of CPSiour of the system including transitions of control strategies. We also introduce a security metrics (.) that gives a measurement of how fast the system might reach a critical state, which is one of the use cases of the proposed framework to build a model-based attack detection mechanism.作者: LATER 時間: 2025-3-22 19:33 作者: 清晰 時間: 2025-3-22 23:35
Lightweight and Tensile Structures,two hash functions, and (2) a nonce-based scheme with one hash-function call and a nonce. We show up?to 2./3-bit security for both of them if the hash function is universal. Compared to the EWCDM construction, our proposals avoid the fact that a single reuse of a nonce can lead to a break.作者: 時代錯誤 時間: 2025-3-23 03:33
Engineering for a Finite Planetgram analysis to follow the original control flow of the program, making state-of-the-art backward tainting and slicing ineffective. We implement a prototype of our VM-based obfuscator and show its effectiveness with experiments on SPEC benchmarking and other real-world applications.作者: HIKE 時間: 2025-3-23 07:24 作者: 懦夫 時間: 2025-3-23 10:56
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Boundtwo hash functions, and (2) a nonce-based scheme with one hash-function call and a nonce. We show up?to 2./3-bit security for both of them if the hash function is universal. Compared to the EWCDM construction, our proposals avoid the fact that a single reuse of a nonce can lead to a break.作者: 羅盤 時間: 2025-3-23 17:12
DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mappinggram analysis to follow the original control flow of the program, making state-of-the-art backward tainting and slicing ineffective. We implement a prototype of our VM-based obfuscator and show its effectiveness with experiments on SPEC benchmarking and other real-world applications.作者: 沉著 時間: 2025-3-23 19:22 作者: cloture 時間: 2025-3-23 23:50
Conference proceedings 2019ogota, Colombia in June 2019.. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; po作者: Contend 時間: 2025-3-24 05:28
0302-9743 held in Bogota, Colombia in June 2019.. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocu作者: 最有利 時間: 2025-3-24 08:41 作者: 駕駛 時間: 2025-3-24 14:23
Rate-Optimizing Compilers for Continuously Non-malleable Codesful for protecting . cryptographic primitives against related-key attacks, as well as for constructing non-malleable public-key encryption schemes. Our results directly improve the efficiency of these applications.作者: Charitable 時間: 2025-3-24 17:11 作者: 一個攪動不安 時間: 2025-3-24 22:57 作者: 字的誤用 時間: 2025-3-24 23:26
https://doi.org/10.1007/978-3-030-21568-2applied cryptography; blockchain security; cryptanalysis; cyber-physical systems security; digital signa作者: GEAR 時間: 2025-3-25 07:18 作者: Cardioversion 時間: 2025-3-25 07:54
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/a/image/159739.jpg作者: Consensus 時間: 2025-3-25 14:28 作者: glomeruli 時間: 2025-3-25 16:24
Engineering for Sustainable Futureyptographic primitives, our attacks abuse legitimate features of the MIME standard and HTML, as supported by email clients, to deceive the user regarding the actual message content. We demonstrate how the attacker can unknowingly abuse the user as a decryption oracle by replying to an unsuspicious l作者: Biguanides 時間: 2025-3-25 22:51
Lecture Notes in Networks and Systemsthe middle state of a cipher and encrypt it twice under two smaller independent permutations. Thus, forkciphers produce two output blocks in one primitive call..Andreeva et al.?proposed ., a tweakable .-based forkcipher that splits the state after five out of ten rounds. While their authenticated en作者: 茁壯成長 時間: 2025-3-26 02:06 作者: Ruptured-Disk 時間: 2025-3-26 04:57
https://doi.org/10.1007/978-3-7643-8166-0authorities, with some verification policy. Neither signer’s identity nor possessed attributes are leaked during the verification process, making ABS schemes a handy tool for applications requiring privacy-preserving authentication. Earlier ABS schemes lacked support for hierarchical delegation of a作者: Latency 時間: 2025-3-26 10:07 作者: 斗志 時間: 2025-3-26 14:08
Lightweight and Tensile Structures,orks by Wegman and Carter, Shoup, and Bernstein. While fully sufficient for many practical applications, the Wegman-Carter construction, however, is well-known to break if nonces are ever repeated, and provides only birthday-bound security if instantiated with a permutation. Those limitations inspir作者: 舊石器 時間: 2025-3-26 19:42
Engineering for a Finite Planetnd security, existing VM-based software obfuscators use potentially multiple but . secret mappings between virtual and native opcodes to hide the underlying instructions. In this paper, we present an attack using frequency analysis to effectively recover the secret mapping to compromise the protecti作者: Eviction 時間: 2025-3-27 00:07 作者: Noisome 時間: 2025-3-27 04:55 作者: Collected 時間: 2025-3-27 07:41
Engineering for a Finite Planet hashes. In addition to performing straightforward dictionary attacks, these tools can expand password dictionaries using password generation rules, such as concatenation of words (e.g., “password123456”) and . (e.g., “password” becomes “p4s5w0rd”). Although these rules work well in practice, creati作者: construct 時間: 2025-3-27 13:10
Lightweight and Tensile Structures, financial transactions. Such blockchain systems reach consensus using proof of work (PoW), and the miners participating in PoW join mining pools to reduce the variance for more stable reward income. Prior literature in blockchain security/game theory identified practical attacks in block withholdin作者: Sleep-Paralysis 時間: 2025-3-27 16:02
https://doi.org/10.1007/978-3-7643-8166-0sses each address transacts with (from January 2009 to May 2018). To obtain a quantitative estimate of the malicious activity that Bitcoin is associated with, we collected over 2.3 million candidate Bitcoin addresses, harvested from the dark web between June 2016 and December 2017. The Bitcoin addre作者: 繁重 時間: 2025-3-27 21:39
Clinical Requirements for Pacemaker Therapyeed up the NIST post-quantum candidates ., ., ., ., and .. For most of those schemes the only previous implementation that executes on the Cortex-M4 is the reference implementation submitted to NIST; for some of those schemes our optimized software is more than factor of 20 faster. One of the scheme作者: 星星 時間: 2025-3-27 22:23
Lecture Notes in Networks and Systemssecurity in reconstruction queries differs strongly from the existing results on the AES. This allows to attack nine out of ten rounds with differential, impossible-differential and yoyo attacks. (2) We observe that some forkcipher modes may lack the interface of reconstruction queries, so that atta作者: Corporeal 時間: 2025-3-28 02:06 作者: cortisol 時間: 2025-3-28 06:46 作者: Calibrate 時間: 2025-3-28 12:41
https://doi.org/10.1007/978-3-7643-8166-0ome network interfaces while reporting that everything is normal in the others. Our paper is the first detailed study of what can and cannot be detected based on the devices an attacker has compromised and where we monitor our network. We show that there are locations that maximize our visibility ag作者: Oratory 時間: 2025-3-28 16:34 作者: osteoclasts 時間: 2025-3-28 19:43 作者: BARK 時間: 2025-3-29 02:05
https://doi.org/10.1007/978-3-7643-8166-0 coinciding with takedowns of known dark web markets. We also found interesting behavior that distinguishes the Bitcoin addresses collected from the dark web when compared to activity of a random address on the Bitcoin blockchain. For example, we found that Bitcoin addresses used on the dark web are作者: MANIA 時間: 2025-3-29 03:52 作者: 堅毅 時間: 2025-3-29 11:06
Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signaturesrity relies on “post-quantum” lattice assumptions. Even for a very large ring size such as 1 billion, our ring signature size is only 3 MB for 128-bit security level compared to 216 MB in the best existing lattice-based result by Libert et al. (EUROCRYPT ’16).作者: Libido 時間: 2025-3-29 13:44 作者: 尾巴 時間: 2025-3-29 18:45 作者: 賞錢 時間: 2025-3-29 23:04 作者: Mercurial 時間: 2025-3-30 01:05 作者: ectropion 時間: 2025-3-30 06:15
Longitudinal Analysis of Misuse of Bitcoin coinciding with takedowns of known dark web markets. We also found interesting behavior that distinguishes the Bitcoin addresses collected from the dark web when compared to activity of a random address on the Bitcoin blockchain. For example, we found that Bitcoin addresses used on the dark web are作者: interrogate 時間: 2025-3-30 08:34 作者: Eructation 時間: 2025-3-30 13:25
Re: What’s Up Johnny?yptographic primitives, our attacks abuse legitimate features of the MIME standard and HTML, as supported by email clients, to deceive the user regarding the actual message content. We demonstrate how the attacker can unknowingly abuse the user as a decryption oracle by replying to an unsuspicious l作者: faction 時間: 2025-3-30 16:49 作者: Adulterate 時間: 2025-3-31 00:04 作者: Essential 時間: 2025-3-31 03:58
Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Lengthauthorities, with some verification policy. Neither signer’s identity nor possessed attributes are leaked during the verification process, making ABS schemes a handy tool for applications requiring privacy-preserving authentication. Earlier ABS schemes lacked support for hierarchical delegation of a作者: 射手座 時間: 2025-3-31 05:29
Raptor: A Practical Lattice-Based (Linkable) Ring Signatureize of the signature is roughly 1.3 KB per user. Prior to our work, all existing lattice-based solutions are analogues of their discrete-log or pairing-based counterparts. We develop a generic construction of (linkable) ring signatures based on the well-known generic construction from Rivest et al.,作者: 五行打油詩 時間: 2025-3-31 10:43