找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cryptography and Security: From Theory to Applications; Essays Dedicated to David Naccache Book 2012 Springer-Verlag GmbH Berlin Heidelber

[復(fù)制鏈接]
樓主: vitamin-D
31#
發(fā)表于 2025-3-26 21:33:02 | 只看該作者
Traceable Signature with Stepping Capabilitiesed to enable authorities to delegate some of their detection capabilities to tracing sub-authorities. Instead of opening every single signatures and then threatening privacy, tracing sub-authorities are able to know if a signature was emitted by specific users only..In 2008, Libert and Yung proposed
32#
發(fā)表于 2025-3-27 01:29:36 | 只看該作者
Deniable RSA Signatureto the cave but they need evidence to get justice from the Caliph. On the other hand, Ali Baba wants to be able to securely access to the cave without leaking any evidence. A similar scenario holds in the biometric passport application: Ali Baba wants to be able to prove his identity securely but do
33#
發(fā)表于 2025-3-27 07:23:47 | 只看該作者
34#
發(fā)表于 2025-3-27 10:36:13 | 只看該作者
Fully Forward-Secure Group Signaturessk analysis shows that taking advantage of system (., hardware, software, network) vulnerabilities is usually much easier than cryptanalyzing the cryptographic primitives themselves. For-ward-secure cryptosystems, in turn, are one of the suggested protective measures, where private keys periodically
35#
發(fā)表于 2025-3-27 15:42:08 | 只看該作者
Public Key Encryption for the Forgetfulpublic key encryption with “backward recovery” contrasts more widely analyzed public key encryption with “forward secrecy”. We advocate that together they form the two sides of a whole coin, whereby offering complementary roles in data security, especially in cloud computing, 3G/4G communications an
36#
發(fā)表于 2025-3-27 18:06:58 | 只看該作者
37#
發(fā)表于 2025-3-28 01:12:51 | 只看該作者
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystemsch as public keys, that do not seem critical must be protected. From the attacks against RSA [5,4], we develop a new attack of DLP-based cryptosystems, built in addition on a lattice analysis [26] to recover DSA public keys from partially known nonces. Based on a realistic fault model, our attack on
38#
發(fā)表于 2025-3-28 04:03:29 | 只看該作者
EM Probes Characterisation for Security Analysisf the Electro-Magnetic (EM) waves radiated from an integrated circuit are used to extract sensitive information. Several research papers have covered EMA but very few have focused on the probes used. In this paper we detail an approach for analysing different probes for EMA. We perform the character
39#
發(fā)表于 2025-3-28 09:39:21 | 只看該作者
40#
發(fā)表于 2025-3-28 11:51:08 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-9 12:05
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
商都县| 酉阳| 凤凰县| 化隆| 扎鲁特旗| 于都县| 金塔县| 瓦房店市| 绵竹市| 朔州市| 顺昌县| 姚安县| 武穴市| 五莲县| 金平| 台湾省| 中方县| 昌宁县| 突泉县| 通城县| 鲜城| 株洲市| 和静县| 五指山市| 玉树县| 岳阳县| 东山县| 柯坪县| 荔波县| 锡林浩特市| 大方县| 萝北县| 德化县| 分宜县| 巍山| 青铜峡市| 青田县| 夏津县| 高州市| 镇康县| 开阳县|