找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Handbuch der praktischen und technischen Informatik; Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllong Book 2000Latest edition Springer-Verlag

[復(fù)制鏈接]
樓主: hedonist
21#
發(fā)表于 2025-3-25 03:44:40 | 只看該作者
22#
發(fā)表于 2025-3-25 10:23:02 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllongara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable sec
23#
發(fā)表于 2025-3-25 14:20:54 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllongpose that for two .-bit RSA moduli . and ., . and . are .-bit primes, . and . share . bits at positions from . to .. Faug.re et al. (PKC 2010) showed that when ., one can factor . and . in polynomial time. In this paper, we improve this bound to . by presenting a new method of solving a homogeneous
24#
發(fā)表于 2025-3-25 15:54:53 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllongncryption (IBLE). Similar as the case of lossy encryption, we show that IBLE can also achieve selective opening security. Finally, we present a construction of IBLE from the assumption of learning with errors.
25#
發(fā)表于 2025-3-25 20:53:17 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllonghe aid of techniques such as the rebound attack, the Meet-in-the-Middle preimage attack and the multicollisions. Firstly, the preimage attack on 5-round . is proposed which is the first preimage attack for . at the hash function level. Then we extend the (previous) attacks on 5-round . and 6-round .
26#
發(fā)表于 2025-3-26 02:47:56 | 只看該作者
27#
發(fā)表于 2025-3-26 04:49:47 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllonghe 15 regular papers and 4 short papers presented in this volume were carefully reviewed and selected from 53 submissions. They were organized in topical sections named: system security; searchable encryption; cryptanalysis; permutation and symmetric encryption; privacy preserving; hardware security
28#
發(fā)表于 2025-3-26 11:16:56 | 只看該作者
29#
發(fā)表于 2025-3-26 13:25:42 | 只看該作者
30#
發(fā)表于 2025-3-26 17:06:07 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-12 00:18
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
博爱县| 二连浩特市| 龙口市| 沁水县| 周宁县| 芜湖县| 贵港市| 江孜县| 桐城市| 绥中县| 深圳市| 东乡族自治县| 名山县| 罗平县| 沈丘县| 峡江县| 扬中市| 寿阳县| 怀集县| 海城市| 东乡县| 阿图什市| 平昌县| 房山区| 建始县| 化德县| 英山县| 札达县| 泗洪县| 潜江市| 泽库县| 鹿泉市| 柘荣县| 临沂市| 楚雄市| 镇沅| 同江市| 青冈县| 仁化县| 津市市| 广州市|