標(biāo)題: Titlebook: Information Security and Cryptology; 6th International Co Xuejia Lai,Moti Yung,Dongdai Lin Conference proceedings 2011 Springer Berlin Heid [打印本頁(yè)] 作者: Interjection 時(shí)間: 2025-3-21 18:51
書目名稱Information Security and Cryptology影響因子(影響力)
書目名稱Information Security and Cryptology影響因子(影響力)學(xué)科排名
書目名稱Information Security and Cryptology網(wǎng)絡(luò)公開度
書目名稱Information Security and Cryptology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security and Cryptology被引頻次
書目名稱Information Security and Cryptology被引頻次學(xué)科排名
書目名稱Information Security and Cryptology年度引用
書目名稱Information Security and Cryptology年度引用學(xué)科排名
書目名稱Information Security and Cryptology讀者反饋
書目名稱Information Security and Cryptology讀者反饋學(xué)科排名
作者: alcohol-abuse 時(shí)間: 2025-3-21 20:35
On the CCA1-Security of Elgamal and Damg?rd’s Elgamalt . is unnecessary for DEG-CCA1, while DDH is insufficient for DEG-CCA1. We also show that CCA1-security of the Elgamal cryptosystem is equivalent to another assumption ., while we show that . is insufficient for Elgamal’s CCA1-security. Finally, we prove a generic-group model lower bound . for the 作者: Genome 時(shí)間: 2025-3-22 04:11
Online/Offline Identity-Based Signcryption Revisitedations are carried out offline while the online part does not require any heavy computations such as pairings or multiplications on elliptic curve. It is particularly suitable for power-constrained devices such as smart cards. We give a concrete implementation of online/offline identity-based signcr作者: 包庇 時(shí)間: 2025-3-22 05:29
Error-free, Multi-bit Non-committing Encryption with Constant Round Complexityous efficient protocols such as the Beaver’s protocol and the Damgard-Nielsen’s protocol cause errors with certain probability, and require restarting the channel setup procedures if an error happens. This causes the main problem of UC-security of a non-committing protocol with error. The proposed e作者: 某人 時(shí)間: 2025-3-22 10:25 作者: 帶來(lái) 時(shí)間: 2025-3-22 13:04
An Efficient, Parameterized and Scalable S-box for Stream Cipherstleneck of speed due to use of large memory, difficulty in hardware realization and more processing. This paper proposes an S-box construction that is easy to implement both in hardware and software. The proposed S-box is efficient in speed, parameterized and scalable with excellent security propert作者: 范例 時(shí)間: 2025-3-22 19:59 作者: theta-waves 時(shí)間: 2025-3-22 22:30 作者: kidney 時(shí)間: 2025-3-23 03:36 作者: 有機(jī)體 時(shí)間: 2025-3-23 08:45
Building Oblivious Transfer on Channel Delays (OT) cannot be securely achieved if the parties are communicating over a clear channel. To preserve secrecy and security, the players have to rely on noise in the communication. Noisy channels are therefore a useful tool to model noise behavior and build protocols implementing OT. This paper explor作者: ANN 時(shí)間: 2025-3-23 11:53
Variants of Multicollision Attacks on Iterated Hash Functionsicollisions that gives larger multicollision sets for the same amount of work as Joux’s famous method i.e. with . work one can find greater than 2.-collisions for large .. Furthermore, if the message length is not restricted, we show that we can create arbitrarily large multicollisions by finding tw作者: DEVIL 時(shí)間: 2025-3-23 17:10
Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisherstudied equivalent expressions of the generalized AES-like permutation. We found that four rounds of the AES-like permutation can be regarded as a Hyper-Sbox. Then we further analyzed the differential properties of both Super-Sbox and Hyper-Sbox. Based on these observations, we give an 8-round trunc作者: 開始從未 時(shí)間: 2025-3-23 19:13 作者: EXALT 時(shí)間: 2025-3-23 23:49
Pseudo-Cryptanalysis of Luffacollisions and pseudo-second-preimages can be found easily by computing the inverse of the message injection function at the beginning of Luffa. We explain in details the pseudo-preimage attacks. For Luffa-224/256, given the hash value, only 2 iteration computations are needed to get a pseudo-preima作者: sebaceous-gland 時(shí)間: 2025-3-24 04:09
Distinguishing Attacks on LPMAC Based on the Full RIPEMD and Reduced-Step RIPEMD-{256,320}PMAC is the secret-prefix MAC with the message length prepended to the message before hashing. Wang et al. presented the first distinguishing attack on HMAC/NMAC-MD5 without the related-key setting in [27], then they extended this technique to give a distinguishing attack on the LPMAC based on 61-st作者: 爵士樂(lè) 時(shí)間: 2025-3-24 07:04 作者: 小教堂 時(shí)間: 2025-3-24 13:59
Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environmentsow looking for a standard. The goal of this paper is to redesign GKE using bilinear pairings, proposed by Desmedt and Lange, from the point of view of arrangement of parties. The arrangement of parties is called a party tree in this paper. Actually, we are able to . the party tree, to reduce the com作者: 龍蝦 時(shí)間: 2025-3-24 18:51
Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Settingorder to increase the security for AKE protocols, various authentication means can be used together. In fact, the existing multi-factor AKE protocols provide an authenticated key exchange only between a client and a server. This paper presents a new multi-factor AKE protocol in the three-party setti作者: Carcinogenesis 時(shí)間: 2025-3-24 19:13 作者: 時(shí)代 時(shí)間: 2025-3-24 23:31 作者: 畢業(yè)典禮 時(shí)間: 2025-3-25 06:11
Lihua Wang,Licheng Wang,Zhenfu Cao,Eiji Okamoto,Jun Shaos increasingly employ commodity information technology (IT) elements and are being connected to the Internet. As a result, they have inherited IT cyber risks, threats and attacks that could affect the safe and reliable operation of infrastructure components, adversely affecting human safety and the 作者: 無(wú)法取消 時(shí)間: 2025-3-25 08:08 作者: corpuscle 時(shí)間: 2025-3-25 13:51 作者: Condense 時(shí)間: 2025-3-25 17:41 作者: EWE 時(shí)間: 2025-3-25 21:29 作者: Flustered 時(shí)間: 2025-3-26 02:44 作者: 壁畫 時(shí)間: 2025-3-26 08:09 作者: 無(wú)情 時(shí)間: 2025-3-26 10:43 作者: aggressor 時(shí)間: 2025-3-26 16:40 作者: itinerary 時(shí)間: 2025-3-26 19:07 作者: Instrumental 時(shí)間: 2025-3-27 00:18 作者: 不易燃 時(shí)間: 2025-3-27 01:57 作者: Antigen 時(shí)間: 2025-3-27 06:43 作者: Gourmet 時(shí)間: 2025-3-27 09:58 作者: IRK 時(shí)間: 2025-3-27 16:55
Weijia Wang,Lei Hu,Yong Lims and a major disruption could have devastating consequences to the economy and society. Protecting industrial control systems requires large numbers of well-trained security personnel to detect and respond to increasingly sophisticated cyber attacks. This chapter evaluates current government and i作者: enchant 時(shí)間: 2025-3-27 20:57
Yvo Desmedt,Atsuko Miyajims and a major disruption could have devastating consequences to the economy and society. Protecting industrial control systems requires large numbers of well-trained security personnel to detect and respond to increasingly sophisticated cyber attacks. This chapter evaluates current government and i作者: 貴族 時(shí)間: 2025-3-28 00:58 作者: 名字 時(shí)間: 2025-3-28 02:16 作者: morale 時(shí)間: 2025-3-28 08:36 作者: 流眼淚 時(shí)間: 2025-3-28 11:24 作者: Anterior 時(shí)間: 2025-3-28 16:44
Information Security and Cryptology978-3-642-21518-6Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: periodontitis 時(shí)間: 2025-3-28 21:03 作者: 姑姑在炫耀 時(shí)間: 2025-3-29 00:18
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465365.jpg作者: 1FAWN 時(shí)間: 2025-3-29 03:34 作者: negotiable 時(shí)間: 2025-3-29 10:49 作者: 饑荒 時(shí)間: 2025-3-29 11:53 作者: Silent-Ischemia 時(shí)間: 2025-3-29 18:16
Huafei Zhu,Feng Baoof the creation of a single European railway market. The paper also discusses the broader issue of the governance of systemic risk in the railway sector, especially since the mitigation of risk tends to be limited to risk management from a technical perspective while ignoring the institutional dimen作者: Conjuction 時(shí)間: 2025-3-29 21:00 作者: 合法 時(shí)間: 2025-3-30 00:51
Sourav Das,Dipanwita RoyChowdhurye international community of scientists, engineers, prac- tioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastruct作者: 游行 時(shí)間: 2025-3-30 04:58 作者: 善于騙人 時(shí)間: 2025-3-30 10:27 作者: 制度 時(shí)間: 2025-3-30 15:38
Zhanfei Zhouoach is demonstrated using a heat exchange process as a case study. By employing an explicit control model rather than a learning system or anomaly detection approach, the minimal requirements on proxy sensors and the need for additional sensors can be characterized. This significantly improves resi作者: 一回合 時(shí)間: 2025-3-30 20:03
Paolo Palmieri,Olivier Pereiraoach is demonstrated using a heat exchange process as a case study. By employing an explicit control model rather than a learning system or anomaly detection approach, the minimal requirements on proxy sensors and the need for additional sensors can be characterized. This significantly improves resi作者: 行業(yè) 時(shí)間: 2025-3-30 21:52 作者: 合乎習(xí)俗 時(shí)間: 2025-3-31 04:46
Shuang Wu,Dengguo Feng,Wenling Wu,Bozhan Suoach is demonstrated using a heat exchange process as a case study. By employing an explicit control model rather than a learning system or anomaly detection approach, the minimal requirements on proxy sensors and the need for additional sensors can be characterized. This significantly improves resi作者: molest 時(shí)間: 2025-3-31 06:28
Chiaki Ohtahara,Yu Sasaki,Takeshi Shimoyamaand logical sub-models that can be viewed and replayed from multiple angles to permit efficient analysis and review. The capabilities of the system are illustrated using a complex scenario of cascading physical and logical failures resulting from a water leakage in a hospital environment.作者: 逢迎春日 時(shí)間: 2025-3-31 09:49
Keting Jia,Yvo Desmedt,Lidong Han,Xiaoyun Wangand logical sub-models that can be viewed and replayed from multiple angles to permit efficient analysis and review. The capabilities of the system are illustrated using a complex scenario of cascading physical and logical failures resulting from a water leakage in a hospital environment.作者: 挫敗 時(shí)間: 2025-3-31 14:30 作者: BOOST 時(shí)間: 2025-3-31 21:36 作者: Ligneous 時(shí)間: 2025-3-31 23:58
Yvo Desmedt,Atsuko Miyajinents and processes associated with industrial control systems. Indeed, there is a great need for training facilities that incorporate real-world industrial control systems and processes to provide trainees with a strong understanding of the effects that cyber-initiated actions have on physical proc作者: Ballerina 時(shí)間: 2025-4-1 04:53
Ying Liu,Fushan Wei,Chuangui Maated to the Occupy Central campaign and classifies the attacks based on their purpose, techniques, targets and propagation. Based on the attack classification and timeline, a framework is provided that helps predict attack patterns and behavior in order to prevent or mitigate attacks launched during作者: 切割 時(shí)間: 2025-4-1 06:29
Zheng Gong,Qiang Tang,Yee Wei Law,Hongyang Chenated to the Occupy Central campaign and classifies the attacks based on their purpose, techniques, targets and propagation. Based on the attack classification and timeline, a framework is provided that helps predict attack patterns and behavior in order to prevent or mitigate attacks launched during作者: 銼屑 時(shí)間: 2025-4-1 11:36
Online/Offline Identity-Based Signcryption Revisitedheme is the . one in the literature to provide this kind of feature. We prove that the proposed scheme meets strong security requirements in the random oracle model, assuming the Strong Diffie-Hellman (SDH) and Bilinear Diffie-Hellman Inversion (BDHI) are computationally hard.作者: 開始發(fā)作 時(shí)間: 2025-4-1 17:39
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Modelandard desktop PC. This novel attack provides us with another theoretical approach to attack WPA and WEP. Remark that our model can be used for more efficient key recovering if any new key collisions can be further discovered in the future.作者: 紅腫 時(shí)間: 2025-4-1 21:33