標(biāo)題: Titlebook: Information Security and Cryptology; 7th International Co Chuan-Kun Wu,Moti Yung,Dongdai Lin Conference proceedings 2012 Springer-Verlag Be [打印本頁] 作者: architect 時(shí)間: 2025-3-21 19:31
書目名稱Information Security and Cryptology影響因子(影響力)
書目名稱Information Security and Cryptology影響因子(影響力)學(xué)科排名
書目名稱Information Security and Cryptology網(wǎng)絡(luò)公開度
書目名稱Information Security and Cryptology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security and Cryptology被引頻次
書目名稱Information Security and Cryptology被引頻次學(xué)科排名
書目名稱Information Security and Cryptology年度引用
書目名稱Information Security and Cryptology年度引用學(xué)科排名
書目名稱Information Security and Cryptology讀者反饋
書目名稱Information Security and Cryptology讀者反饋學(xué)科排名
作者: 整體 時(shí)間: 2025-3-21 22:19 作者: Stricture 時(shí)間: 2025-3-22 01:55 作者: 陳腐的人 時(shí)間: 2025-3-22 06:27
Fault Attacks against the Miller Algorithm in Hessian Coordinates,e devices such as smart card, a lot of attentions are attracted to analyze these devices. In this paper, we investigate a new approach based on the resolution of a nonlinear system, and this approach has an advantage that the pairing based cryptography in Hessian coordinates is vulnerable to a fault attack.作者: JOG 時(shí)間: 2025-3-22 09:33 作者: semble 時(shí)間: 2025-3-22 13:14
A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening,ad of the one-time signature technology. Our construction gives new view of IBE-to-PKENO technique, and some previously known PKENO schemes can be viewed as concrete instantiations of our generic construction. At last, we also give a new instantiation, which is (slightly) more efficient than the best known scheme [13].作者: 鋼筆尖 時(shí)間: 2025-3-22 18:43
Cryptanalysis of Reduced-Round KLEIN Block Cipher,al analysis and present an integral analysis of 7-round KLEIN-64 and 8-round KLEIN-80 using a 5-round distinguisher, which is constructed by utilizing higher-order integral and higher-order differential properties.作者: 粗糙濫制 時(shí)間: 2025-3-22 22:23
An Efficient RSA Implementation without Precomputation,actions. By a small change of the multiplier, our algorithm does not need the last subtraction. We also propose a pipeline scheme which can achieve high frequency. Compared with existing work (including the precomputation ones), our implementation improves the ./. by 47%.作者: hardheaded 時(shí)間: 2025-3-23 02:16
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming,rors are greatly reduced. Our method is used to analyze Enocoro-128v2, a stream cipher that consists of 96 rounds. We prove that 38 rounds are sufficient for security against differential cryptanalysis, and 61 rounds for security against linear cryptanalysis. We also illustrate our technique by calculating the number of active S-boxes for AES.作者: 遣返回國(guó) 時(shí)間: 2025-3-23 08:45
Adleman-Manders-Miller Root Extraction Method Revisited, has to solve discrete logarithms for .th root extraction. In this paper, we clarify their method and analyze its complexity. Our heuristic presentation is helpful to grasp the method entirely and deeply.作者: FLIRT 時(shí)間: 2025-3-23 10:41
Efficient Self-certified Signatures with Batch Verification,nly one modular multiplication in signing with pre-computation. One of features of our scheme lies in its batch verification in both single-signer and multi-signer settings. Pairing computations in the batch verification are independent from the number of signatures. Our scheme is proven secure in the random oracle model.作者: FISC 時(shí)間: 2025-3-23 15:36
Weak-Key Class of MISTY1 for Related-Key Differential Attack, under the weak-key class, which lead to the attacks on the 8-round MISTY1 without the first . lay. The attack requires 2. chosen ciphertexts, and the time complexities is 2.. To the best of our knowledge, the attack reported in this paper is the most powerful attack against MISTY1 with two related keys.作者: CHASE 時(shí)間: 2025-3-23 19:38
0302-9743 11. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.978-3-642-34703-0978-3-642-34704-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: PAGAN 時(shí)間: 2025-3-23 23:17 作者: 一起 時(shí)間: 2025-3-24 04:28 作者: 不可磨滅 時(shí)間: 2025-3-24 09:42 作者: CARK 時(shí)間: 2025-3-24 10:42 作者: Soliloquy 時(shí)間: 2025-3-24 14:57
Information Security and Cryptology978-3-642-34704-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Meander 時(shí)間: 2025-3-24 22:00
Improved Tradeoff between Encapsulation and Decapsulation of HK09,We propose a new variant of HK09 (Proposed by Hofheinz and Kiltz in Eurocrypt2009) which simplifies the decapsulation. Our result is a tradeoff between the efficiency of encapsulation and decapsulation. Compared with original HK09 the efficiency of decapsulation is improved by 38.9% and the efficiency of encapsulation is dropped by 11.4%.作者: Yag-Capsulotomy 時(shí)間: 2025-3-25 02:24
Cryptanalysis vs. Provable Security,aring cryptanalysis results and provable security results on a variety of topics. We argue that security is complex, and that there is much to gain from better interaction between cryptanalysis and provable security.作者: malapropism 時(shí)間: 2025-3-25 05:31
Non-interactive Deniable Authentication Protocols,a key-compromise-impersonation attack. We analyze some NIDA protocols in the model, and we find that no one is satisfactory. We give a new paradigm to construct an NIDA protocol, which is provably secure in the model.作者: 類人猿 時(shí)間: 2025-3-25 11:01 作者: 考博 時(shí)間: 2025-3-25 11:38
Chuan-Kun Wu,Moti Yung,Dongdai LinUp to date results.Fast track conference proceedings.State of the art research作者: ALE 時(shí)間: 2025-3-25 18:05
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465360.jpg作者: 美食家 時(shí)間: 2025-3-25 22:24 作者: BAN 時(shí)間: 2025-3-26 03:38
Xabier Ugarte-Pedrero,Igor Santos,Pablo G. Bringasmajor critical findings.Aids elimination of preventable erroThis book provides clear guidance as to which neuroradiological findings in ill or injured patients should be immediately communicated by radiologists and trainees to the emergency room and referring physicians in order to facilitate key de作者: FOIL 時(shí)間: 2025-3-26 07:48
Lin Wang,Bing Shen,TongXu Qiaomajor critical findings.Aids elimination of preventable erroThis book provides clear guidance as to which neuroradiological findings in ill or injured patients should be immediately communicated by radiologists and trainees to the emergency room and referring physicians in order to facilitate key de作者: 濕潤(rùn) 時(shí)間: 2025-3-26 10:37 作者: exorbitant 時(shí)間: 2025-3-26 14:12
Zhengjun Cao,Qian Sha,Xiao Fanransforming youth engagement with young adult literature.Young Adult literature, from The Outsiders to Harry Potter, has helped shape the cultural landscape for adolescents perhaps more than any other form of consumable media in the twentieth and twenty-first century. With the rise of mega blockbust作者: BLAND 時(shí)間: 2025-3-26 17:05 作者: carotid-bruit 時(shí)間: 2025-3-27 00:43 作者: 羊齒 時(shí)間: 2025-3-27 03:23 作者: 明智的人 時(shí)間: 2025-3-27 06:06
Wei Huang,Xianfeng Zhao,Dengguo Feng,Rennong Shengransforming youth engagement with young adult literature.Young Adult literature, from The Outsiders to Harry Potter, has helped shape the cultural landscape for adolescents perhaps more than any other form of consumable media in the twentieth and twenty-first century. With the rise of mega blockbust作者: 潛移默化 時(shí)間: 2025-3-27 13:20 作者: 方便 時(shí)間: 2025-3-27 17:35
Haibo Tian,Xiaofeng Chen,Zhengtao Jiangransforming youth engagement with young adult literature.Young Adult literature, from The Outsiders to Harry Potter, has helped shape the cultural landscape for adolescents perhaps more than any other form of consumable media in the twentieth and twenty-first century. With the rise of mega blockbust作者: 他姓手中拿著 時(shí)間: 2025-3-27 20:31
Haixin Song,Xiubin Fan,Chuankun Wu,Dengguo Fengransforming youth engagement with young adult literature.Young Adult literature, from The Outsiders to Harry Potter, has helped shape the cultural landscape for adolescents perhaps more than any other form of consumable media in the twentieth and twenty-first century. With the rise of mega blockbust作者: CRATE 時(shí)間: 2025-3-27 22:43 作者: 煩躁的女人 時(shí)間: 2025-3-28 03:11
Jiang Zhang,Xiang Xie,Rui Zhang,Zhenfeng Zhangs concerned with visual representation practices and textboo.School science is dominated by textbook-oriented approaches to teaching and learning. Some surveys reveal that students have to read, depending on academic level, between ten and thirty-six pages per week from their textbook. One therefore作者: Triglyceride 時(shí)間: 2025-3-28 08:29 作者: SOBER 時(shí)間: 2025-3-28 11:59 作者: WITH 時(shí)間: 2025-3-28 17:01 作者: fetter 時(shí)間: 2025-3-28 21:46 作者: Parameter 時(shí)間: 2025-3-29 00:47
Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems, .) shares (typically, each of size comparable to the original secret key). In these schemes, a quorum of at least (.?≤?.) servers needs to act upon a message to produce the result (decrypted value or signature), while corrupting less than . servers maintains the scheme’s security. For about two dec作者: stratum-corneum 時(shí)間: 2025-3-29 04:34
Cryptanalysis vs. Provable Security,aring cryptanalysis results and provable security results on a variety of topics. We argue that security is complex, and that there is much to gain from better interaction between cryptanalysis and provable security.作者: Contend 時(shí)間: 2025-3-29 11:15 作者: 殺蟲劑 時(shí)間: 2025-3-29 14:04
Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs,nlinear shift registers are equivalent, i.e., whether they generate the same set of output sequences. We define a dependence graph of a shift register and it is a directed acyclic graph related to the shift register. We show that existence of a dependence graph with a special property of a nonlinear作者: crease 時(shí)間: 2025-3-29 16:49 作者: ORE 時(shí)間: 2025-3-29 20:32
Adleman-Manders-Miller Root Extraction Method Revisited, not shown enough details. Actually, there is a dramatic difference between the square root extraction and the general .th root extraction because one has to solve discrete logarithms for .th root extraction. In this paper, we clarify their method and analyze its complexity. Our heuristic presentati作者: Eructation 時(shí)間: 2025-3-30 01:21 作者: 笨重 時(shí)間: 2025-3-30 06:38 作者: 遺傳 時(shí)間: 2025-3-30 12:06 作者: 慢慢流出 時(shí)間: 2025-3-30 13:55 作者: 性行為放縱者 時(shí)間: 2025-3-30 16:46
Non-interactive Deniable Authentication Protocols,a key-compromise-impersonation attack. We analyze some NIDA protocols in the model, and we find that no one is satisfactory. We give a new paradigm to construct an NIDA protocol, which is provably secure in the model.作者: 裝飾 時(shí)間: 2025-3-30 21:53
On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3,loiting the bias in the carry cells of a Galois FCSR. In order to resist this attack, at SAC 2009 F. Arnault . proposed the new stream cipher F-FCSR-H v3 based upon a ring FCSR. M. Hell and T. Johansson only presented experimental results but no theoretical results for the success probability of the作者: sperse 時(shí)間: 2025-3-31 03:05
Efficient Self-certified Signatures with Batch Verification,e concept of . public key was put forth by Girault. In this paper, we propose an efficient and novel self-certified signature scheme, which requires only one modular multiplication in signing with pre-computation. One of features of our scheme lies in its batch verification in both single-signer and作者: prosthesis 時(shí)間: 2025-3-31 06:11 作者: esoteric 時(shí)間: 2025-3-31 10:50 作者: 印第安人 時(shí)間: 2025-3-31 14:41
Weak-Key Class of MISTY1 for Related-Key Differential Attack,e algorithm, a weak-key class encompassing 2. weak keys of MISTY1 is found. Then we present 7-round related-key differential characteristics of MISTY1 under the weak-key class, which lead to the attacks on the 8-round MISTY1 without the first . lay. The attack requires 2. chosen ciphertexts, and the作者: Pituitary-Gland 時(shí)間: 2025-3-31 17:37
Cryptanalysis of Reduced-Round KLEIN Block Cipher,st investigate the security of KLEIN against truncated differential analysis. We construct a 6-round truncated differential distinguisher based on a careful observation about the characteristic of KLEIN round function. With the help of this new distinguisher, we give a truncated differential analysi作者: 珍奇 時(shí)間: 2025-3-31 23:05
An Efficient RSA Implementation without Precomputation,putation. Precomputation improves the speed and in the meanwhile makes the algorithms more complex. The complex algorithms are not suitable for hardware implementation. We propose a new algorithm without precomputation, which is more efficient even compared with the ones with precomputation. Our alg作者: Mitigate 時(shí)間: 2025-4-1 02:55 作者: GUISE 時(shí)間: 2025-4-1 07:11 作者: enmesh 時(shí)間: 2025-4-1 11:21
Xusheng Zhang,Shan Chen,Dongdai Lin?,’ and ‘What practices are required to read inscriptions in school textbooks?’ That is, we are interested not only in understanding what it takes to interpret, read, and understand visual materials (i.e., insc978-1-4020-5711-3978-1-4020-3376-6Series ISSN 1878-0482 Series E-ISSN 1878-0784