找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Cryptology - AUSCRYPT ‘92; Workshop on the Theo Jennifer Seberry,Yuliang Zheng Conference proceedings 1993 Springer-Verlag Berl

[復(fù)制鏈接]
樓主: 歸納
41#
發(fā)表于 2025-3-28 15:56:02 | 只看該作者
42#
發(fā)表于 2025-3-28 22:23:43 | 只看該作者
https://doi.org/10.1007/978-1-908517-90-6low) and the latter cannot be reused. All these limitations are solved in this paper by presenting a resuable conditionally secure authentication scheme with arbiter. The scheme is unconditionally secure against denial by the sender of having sent a message (which signatures do . have) and condition
43#
發(fā)表于 2025-3-29 00:57:49 | 只看該作者
Placental Function: Predicting Impairmentor the probability of success in each case and study the relationship of the two classes. We prove a new lower bound on the probability of deception which points out the importance of the average-distance between the encoding rules of the code in the protection provided by it. Codes with perfect pro
44#
發(fā)表于 2025-3-29 04:04:37 | 只看該作者
https://doi.org/10.1007/978-94-011-2638-0monotone access structure together with a security level is associated with a unique cumulative scheme. Geometric secret sharing schemes form a wide class of secret sharing schemes which have many desirable properties including good information rates. We show that every non-degenerate geometric secr
45#
發(fā)表于 2025-3-29 09:36:03 | 只看該作者
Caring for Mental Health in the Futureets ... In an NSS, it is possible that |..|<|.|, where |..| is the size of the share and |.| is the size of the secret. This paper characterizes nonperfect secret sharing schemes. First, we show that (.., .., ..) is realizable if and only if .. is monotone and .. ∪ .. is monotone. Then, we derive a
46#
發(fā)表于 2025-3-29 14:14:54 | 只看該作者
https://doi.org/10.1007/978-1-349-12879-2k codes. Already in the beginning of the eighties constructions of threshold schemes using linear block codes were presented in [6] and [7]. In this paper we generalize those results to construct secret sharing schemes for arbitrary access structure. We also present a solution to the problem of retr
47#
發(fā)表于 2025-3-29 18:58:59 | 只看該作者
The initial interview and health historyrepresents the fingerprint or digest of the message. A cryptographically useful property of a one-way hashing algorithm is that it is infeasible to find two distinct messages that have the same fingerprint. This paper proposes a one-way hashing algorithm called HAVAL. HAVAL compresses a message of a
48#
發(fā)表于 2025-3-29 21:43:30 | 只看該作者
Mary Carroll,L. Jane Brue,Brian Boothon based on “fingerprinting”. This paper proposes a new efficient class of hash functions based on a block cipher that allows for a tradeoff between security and speed. The principles behind the scheme can be used to optimize similar proposals.
49#
發(fā)表于 2025-3-30 01:14:22 | 只看該作者
50#
發(fā)表于 2025-3-30 04:38:40 | 只看該作者
https://doi.org/10.1007/978-1-349-12879-2 each individual member within the group, publishes a single group public key. During an initial “commitment phase”, at least . group members work together to sign a message. In a “verification phase”, all signers work together to prove the validity of the signature to an outsider. There is only a s
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-20 23:43
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
东至县| 宁蒗| 芜湖县| 晋州市| 德化县| 宁武县| 抚宁县| 曲阳县| 惠来县| 大洼县| 宜川县| 陇川县| 南陵县| 漳州市| 嘉善县| 疏附县| 东阳市| 五常市| 万荣县| 安福县| 开封市| 石嘴山市| 嵊泗县| 龙口市| 金华市| 平湖市| 西城区| 彭水| 宕昌县| 南溪县| 阿巴嘎旗| 安仁县| 苍梧县| 东兴市| 鄢陵县| 古浪县| 民县| 张家口市| 靖宇县| 台安县| 乌拉特后旗|