找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Cryptology — CRYPTO ’94; 14th Annual Internat Yvo G. Desmedt Conference proceedings 1994 Springer-Verlag Berlin Heidelberg 1994

[復制鏈接]
樓主: malcontented
11#
發(fā)表于 2025-3-23 10:32:05 | 只看該作者
,Law, Politics, and Sovereignty: 1919–1923, It is an identity-based signature scheme in which each signature can be used only once. We called such schemes “bounded life-span”. It is based on mental games and it uses zero-knowledge tools. A validation center is needed to initialize this identity-based scheme. A credential center is used to in
12#
發(fā)表于 2025-3-23 16:02:04 | 只看該作者
Carl Schmitt on Law and Liberalismefficient and flexible than the previously proposed methods, especially in the case where the amount of storage available is very small or quite large. It is also very efficient in computing .... for a small size . and variable number ., which occurs in the verification of Schnorr’s identification s
13#
發(fā)表于 2025-3-23 21:47:08 | 只看該作者
14#
發(fā)表于 2025-3-24 01:28:57 | 只看該作者
Carl Schmitt und die Liberalismuskritikbility of turbulence is well-understood mathematically; it reduces not to computational complexity, but to information losses. By timing disk accesses, a program can efficiently extract at least 100 independent, unbiased bits per minute, at no hardware cost. This paper has three parts: a mathematica
15#
發(fā)表于 2025-3-24 05:59:21 | 只看該作者
Carl Schmitt — Ein deutsches Schicksal. times. This multiround authentication makes it possible to limit the key size independently of the message length. We propose a new attack and show that the probability analysis made by Gemmell and Naor, which was only based on the minimum distance property of the codes, does not hold for our atta
16#
發(fā)表于 2025-3-24 07:22:52 | 只看該作者
17#
發(fā)表于 2025-3-24 11:49:50 | 只看該作者
18#
發(fā)表于 2025-3-24 14:59:51 | 只看該作者
https://doi.org/10.1057/9781137466594ward a general theory of multi-secret sharing schemes by using an information theoretical framework. We prove lower bounds on the size of information held by each participant for various access structures. Finally, we prove the optimality of the bounds by providing protocols.
19#
發(fā)表于 2025-3-24 20:54:34 | 只看該作者
https://doi.org/10.1057/9781137466594rs but only use simple operations (see [., .]). One was presented at the CRYPTO 89 rump session ([.]) and depends on the so-called Permuted Kernel problem (PKP). Another appeared in the CRYPTO 93 proceedings and is based on the syndrome decoding problem (SD) form the theory of error correcting codes
20#
發(fā)表于 2025-3-24 23:48:26 | 只看該作者
https://doi.org/10.1057/9781137466594have a secret sharing scheme . on . participants. Then under certain assumptions on . and ., we show how to transform . into a witness indistinguishable protocol, in which the prover demonstrates knowledge of the solution to some subset of . problem instances out of a collection of subsets defined b
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-13 06:50
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
汪清县| 黄骅市| 河源市| 弥渡县| 岱山县| 普兰店市| 增城市| 佛山市| 陵水| 石嘴山市| 嘉鱼县| 桂东县| 隆化县| 普安县| 上饶县| 玛曲县| 黄梅县| 汶川县| 教育| 十堰市| 深州市| 林口县| 海林市| 迭部县| 申扎县| 桂东县| 庆云县| 文成县| 读书| 水城县| 沛县| 长岛县| 务川| 达孜县| 元阳县| 贵州省| 慈溪市| 石河子市| 荔波县| 汝南县| 白城市|