找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Cryptology — CRYPTO ’94; 14th Annual Internat Yvo G. Desmedt Conference proceedings 1994 Springer-Verlag Berlin Heidelberg 1994

[復(fù)制鏈接]
樓主: malcontented
11#
發(fā)表于 2025-3-23 10:32:05 | 只看該作者
,Law, Politics, and Sovereignty: 1919–1923, It is an identity-based signature scheme in which each signature can be used only once. We called such schemes “bounded life-span”. It is based on mental games and it uses zero-knowledge tools. A validation center is needed to initialize this identity-based scheme. A credential center is used to in
12#
發(fā)表于 2025-3-23 16:02:04 | 只看該作者
Carl Schmitt on Law and Liberalismefficient and flexible than the previously proposed methods, especially in the case where the amount of storage available is very small or quite large. It is also very efficient in computing .... for a small size . and variable number ., which occurs in the verification of Schnorr’s identification s
13#
發(fā)表于 2025-3-23 21:47:08 | 只看該作者
14#
發(fā)表于 2025-3-24 01:28:57 | 只看該作者
Carl Schmitt und die Liberalismuskritikbility of turbulence is well-understood mathematically; it reduces not to computational complexity, but to information losses. By timing disk accesses, a program can efficiently extract at least 100 independent, unbiased bits per minute, at no hardware cost. This paper has three parts: a mathematica
15#
發(fā)表于 2025-3-24 05:59:21 | 只看該作者
Carl Schmitt — Ein deutsches Schicksal. times. This multiround authentication makes it possible to limit the key size independently of the message length. We propose a new attack and show that the probability analysis made by Gemmell and Naor, which was only based on the minimum distance property of the codes, does not hold for our atta
16#
發(fā)表于 2025-3-24 07:22:52 | 只看該作者
17#
發(fā)表于 2025-3-24 11:49:50 | 只看該作者
18#
發(fā)表于 2025-3-24 14:59:51 | 只看該作者
https://doi.org/10.1057/9781137466594ward a general theory of multi-secret sharing schemes by using an information theoretical framework. We prove lower bounds on the size of information held by each participant for various access structures. Finally, we prove the optimality of the bounds by providing protocols.
19#
發(fā)表于 2025-3-24 20:54:34 | 只看該作者
https://doi.org/10.1057/9781137466594rs but only use simple operations (see [., .]). One was presented at the CRYPTO 89 rump session ([.]) and depends on the so-called Permuted Kernel problem (PKP). Another appeared in the CRYPTO 93 proceedings and is based on the syndrome decoding problem (SD) form the theory of error correcting codes
20#
發(fā)表于 2025-3-24 23:48:26 | 只看該作者
https://doi.org/10.1057/9781137466594have a secret sharing scheme . on . participants. Then under certain assumptions on . and ., we show how to transform . into a witness indistinguishable protocol, in which the prover demonstrates knowledge of the solution to some subset of . problem instances out of a collection of subsets defined b
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-13 10:48
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
诸暨市| 九龙坡区| 大石桥市| 黎平县| 柳林县| 西吉县| 桂阳县| 鹤山市| 于田县| 河津市| 桐庐县| 东源县| 台中市| 枣强县| 湘阴县| 屏山县| 秀山| 呼图壁县| 嘉祥县| 芷江| 凤台县| 黄陵县| 柏乡县| 湖北省| 邛崃市| 日土县| 丽江市| 江达县| 罗平县| 昭通市| 蓝山县| 绥化市| 大安市| 枣庄市| 通榆县| 宾川县| 德令哈市| 南京市| 阳原县| 达拉特旗| 唐河县|