找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Cryptology — CRYPTO ’94; 14th Annual Internat Yvo G. Desmedt Conference proceedings 1994 Springer-Verlag Berlin Heidelberg 1994

[復(fù)制鏈接]
樓主: malcontented
11#
發(fā)表于 2025-3-23 10:32:05 | 只看該作者
,Law, Politics, and Sovereignty: 1919–1923, It is an identity-based signature scheme in which each signature can be used only once. We called such schemes “bounded life-span”. It is based on mental games and it uses zero-knowledge tools. A validation center is needed to initialize this identity-based scheme. A credential center is used to in
12#
發(fā)表于 2025-3-23 16:02:04 | 只看該作者
Carl Schmitt on Law and Liberalismefficient and flexible than the previously proposed methods, especially in the case where the amount of storage available is very small or quite large. It is also very efficient in computing .... for a small size . and variable number ., which occurs in the verification of Schnorr’s identification s
13#
發(fā)表于 2025-3-23 21:47:08 | 只看該作者
14#
發(fā)表于 2025-3-24 01:28:57 | 只看該作者
Carl Schmitt und die Liberalismuskritikbility of turbulence is well-understood mathematically; it reduces not to computational complexity, but to information losses. By timing disk accesses, a program can efficiently extract at least 100 independent, unbiased bits per minute, at no hardware cost. This paper has three parts: a mathematica
15#
發(fā)表于 2025-3-24 05:59:21 | 只看該作者
Carl Schmitt — Ein deutsches Schicksal. times. This multiround authentication makes it possible to limit the key size independently of the message length. We propose a new attack and show that the probability analysis made by Gemmell and Naor, which was only based on the minimum distance property of the codes, does not hold for our atta
16#
發(fā)表于 2025-3-24 07:22:52 | 只看該作者
17#
發(fā)表于 2025-3-24 11:49:50 | 只看該作者
18#
發(fā)表于 2025-3-24 14:59:51 | 只看該作者
https://doi.org/10.1057/9781137466594ward a general theory of multi-secret sharing schemes by using an information theoretical framework. We prove lower bounds on the size of information held by each participant for various access structures. Finally, we prove the optimality of the bounds by providing protocols.
19#
發(fā)表于 2025-3-24 20:54:34 | 只看該作者
https://doi.org/10.1057/9781137466594rs but only use simple operations (see [., .]). One was presented at the CRYPTO 89 rump session ([.]) and depends on the so-called Permuted Kernel problem (PKP). Another appeared in the CRYPTO 93 proceedings and is based on the syndrome decoding problem (SD) form the theory of error correcting codes
20#
發(fā)表于 2025-3-24 23:48:26 | 只看該作者
https://doi.org/10.1057/9781137466594have a secret sharing scheme . on . participants. Then under certain assumptions on . and ., we show how to transform . into a witness indistinguishable protocol, in which the prover demonstrates knowledge of the solution to some subset of . problem instances out of a collection of subsets defined b
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-13 10:48
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
佳木斯市| 大渡口区| 宣威市| 铁岭市| 区。| 临猗县| 苗栗县| 灵台县| 广州市| 许昌县| 沛县| 延长县| 禹州市| 广河县| 长葛市| 泸西县| 定襄县| 天峨县| 环江| 平邑县| 米脂县| 泾川县| 寿阳县| 巴东县| 拉萨市| 刚察县| 石城县| 奉节县| 合作市| 读书| 泰和县| 都匀市| 正宁县| 洛川县| 社会| 南和县| 金溪县| 贺州市| 梁河县| 丹巴县| 神木县|