標題: Titlebook: Cryptology and Network Security; 19th International C Stephan Krenn,Haya Shulman,Serge Vaudenay Conference proceedings 2020 Springer Nature [打印本頁] 作者: CROSS 時間: 2025-3-21 17:42
書目名稱Cryptology and Network Security影響因子(影響力)
書目名稱Cryptology and Network Security影響因子(影響力)學(xué)科排名
書目名稱Cryptology and Network Security網(wǎng)絡(luò)公開度
書目名稱Cryptology and Network Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Cryptology and Network Security被引頻次
書目名稱Cryptology and Network Security被引頻次學(xué)科排名
書目名稱Cryptology and Network Security年度引用
書目名稱Cryptology and Network Security年度引用學(xué)科排名
書目名稱Cryptology and Network Security讀者反饋
書目名稱Cryptology and Network Security讀者反饋學(xué)科排名
作者: GLOOM 時間: 2025-3-21 22:18 作者: 慎重 時間: 2025-3-22 01:41 作者: dissolution 時間: 2025-3-22 07:32
. Hence the need to propose new curves has emerged..In this work, we give one new curve that is specifically tailored to be fast over the first pairing-group, which is well suited for several cryptographic schemes, such as group signatures, and their variants, or accumulators.作者: Projection 時間: 2025-3-22 11:20
Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secu show that it satisfies the security properties required by the compiler of D?ttling et al. (Eurocrypt 2020), achieving the first fully UC-secure two-round OT protocol based on supersingular isogenies.作者: 致命 時間: 2025-3-22 16:16 作者: 致命 時間: 2025-3-22 18:49 作者: arousal 時間: 2025-3-22 23:53 作者: xanthelasma 時間: 2025-3-23 02:10
Conference proceedings 2020tria, in December 2020.*.The 30 full papers were carefully reviewed and selected from 118 submissions. The papers focus on topics such as cybersecurity; credentials; elliptic curves; payment systems; privacy-enhancing tools; lightweight cryptography; and codes and lattices...*The conference was held作者: paradigm 時間: 2025-3-23 05:44
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/240605.jpg作者: Malleable 時間: 2025-3-23 10:35
Cryptology and Network Security978-3-030-65411-5Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Glutinous 時間: 2025-3-23 16:13 作者: FLINT 時間: 2025-3-23 18:43 作者: Canvas 時間: 2025-3-24 00:56
978-3-030-65410-8Springer Nature Switzerland AG 2020作者: 鋪子 時間: 2025-3-24 05:11 作者: GRAIN 時間: 2025-3-24 06:31 作者: 安心地散步 時間: 2025-3-24 12:47 作者: 厭食癥 時間: 2025-3-24 15:57
hey inject a small amount of poisoning points into a training set of the machine learning model, aiming to degrade the overall accuracy of the model. . is a variant of data poisoning attacks that injects malicious data into the model to cause a misclassification of the . input data while keeping alm作者: 貞潔 時間: 2025-3-24 20:31
ironments. Hence, a defense mechanism needs to be incorporated in emulation based analysis platforms to mitigate the emulation-detection strategies opted by malware. In this paper, first we design an emulation-detection library that has configurable capabilities ranging from basic to advanced detect作者: Permanent 時間: 2025-3-24 23:12 作者: 無彈性 時間: 2025-3-25 03:32 作者: 欄桿 時間: 2025-3-25 09:55 作者: Lasting 時間: 2025-3-25 13:57
dom” passwords, so they reuse or create similar passwords using a combination of predictable words, numbers, and symbols?[.]. Previous password-generation or management protocols have imposed so large a cognitive load that users have abandoned them in favor of insecure yet simpler methods (., writin作者: 上漲 時間: 2025-3-25 19:34 作者: Gobble 時間: 2025-3-25 22:31 作者: 輕快來事 時間: 2025-3-26 00:56
logarithm and isogeny-based cryptography). We give an instantiation based on the semi-commutative action of isogenies of supersingular elliptic curves, in the style of the SIDH key-exchange protocol. We then construct an oblivious transfer protocol using this new structure and prove that it UC-secu作者: Abjure 時間: 2025-3-26 07:05 作者: 全國性 時間: 2025-3-26 10:59 作者: 使厭惡 時間: 2025-3-26 13:31 作者: SLING 時間: 2025-3-26 18:04 作者: FAWN 時間: 2025-3-26 21:12 作者: adduction 時間: 2025-3-27 04:02
Cross-Site Search Attacks: Unauthorized Queries over Private Datatract the information, using cleverly-designed cross-site queries..In this work, we present a systematic approach to the study of cross-site search attacks. We begin with a comprehensive taxonomy, clarifying the relationships between different types of cross-site search attacks, as well as relations作者: 不開心 時間: 2025-3-27 05:46
Stronger Targeted Poisoning Attacks Against Malware Detectionhey inject a small amount of poisoning points into a training set of the machine learning model, aiming to degrade the overall accuracy of the model. . is a variant of data poisoning attacks that injects malicious data into the model to cause a misclassification of the . input data while keeping alm作者: Supplement 時間: 2025-3-27 11:19
STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Enviironments. Hence, a defense mechanism needs to be incorporated in emulation based analysis platforms to mitigate the emulation-detection strategies opted by malware. In this paper, first we design an emulation-detection library that has configurable capabilities ranging from basic to advanced detect作者: 千篇一律 時間: 2025-3-27 15:12 作者: patriot 時間: 2025-3-27 17:55 作者: 遠地點 時間: 2025-3-27 23:09 作者: 松果 時間: 2025-3-28 03:43
Trenchcoat: Human-Computable Hashing Algorithms for Password Generationdom” passwords, so they reuse or create similar passwords using a combination of predictable words, numbers, and symbols?[.]. Previous password-generation or management protocols have imposed so large a cognitive load that users have abandoned them in favor of insecure yet simpler methods (., writin作者: 口訣法 時間: 2025-3-28 09:06
Provably Secure Scalable Distributed Authentication for Cloudsabase. In case of server compromise the secrets are vulnerable to theft. A possible solution to this problem to apply distributed systems. We propose a mutual authentication protocol with key agreement, where identity verification is carried out by multiple servers applying secret sharing technology作者: Asymptomatic 時間: 2025-3-28 11:00 作者: 燈泡 時間: 2025-3-28 15:12 作者: 泥沼 時間: 2025-3-28 21:56
Optimized and Secure Pairing-Friendly Elliptic Curves Suitable for One Layer Proof Compositionn-interactive, short and cheap to verify. This property makes them suitable for recursive proof composition, that is proofs attesting to the validity of other proofs. To achieve this, one . the arithmetic operations .. Recursive proof composition has been empirically demonstrated for pairing-based S作者: 多骨 時間: 2025-3-29 00:38 作者: pancreas 時間: 2025-3-29 06:25 作者: strdulate 時間: 2025-3-29 07:31
An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemessignature scheme based on the hardness of the permuted kernel problem) and list other schemes that may be affected. Finally, we use our analysis to choose parameters and investigate the performance of a 5-round variant of the Picnic scheme.作者: GOAT 時間: 2025-3-29 13:04 作者: Bumble 時間: 2025-3-29 17:52 作者: Arb853 時間: 2025-3-29 21:08 作者: 細頸瓶 時間: 2025-3-30 00:19 作者: Adjourn 時間: 2025-3-30 07:06 作者: 持久 時間: 2025-3-30 09:50
Distance-Bounding, Privacy-Preserving Attribute-Based Credentialsnce bounding. We also performed a symbolic verification of security properties needed for resisting these attacks, implemented in Tamarin..Encouraged by results from Singh et al. (NDSS’19), we take advantage of lessened constraints on how much can be sent in the fast phase of the distance-bounding p作者: genuine 時間: 2025-3-30 13:13
Trenchcoat: Human-Computable Hashing Algorithms for Password Generationord ., parameterized by the master secret ., ...We exploit the unique configuration . of each user’s associative and implicit memory (detailed in Sect.?.) to ensure that sources of randomness unique to each user are present in each .. An adversary cannot compute or verify . efficiently since . is un作者: 火車車輪 時間: 2025-3-30 17:33