找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Handbuch der praktischen und technischen Informatik; Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllong Book 2000Latest edition Springer-Verlag

[復(fù)制鏈接]
樓主: hedonist
21#
發(fā)表于 2025-3-25 03:44:40 | 只看該作者
22#
發(fā)表于 2025-3-25 10:23:02 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllongara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable sec
23#
發(fā)表于 2025-3-25 14:20:54 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllongpose that for two .-bit RSA moduli . and ., . and . are .-bit primes, . and . share . bits at positions from . to .. Faug.re et al. (PKC 2010) showed that when ., one can factor . and . in polynomial time. In this paper, we improve this bound to . by presenting a new method of solving a homogeneous
24#
發(fā)表于 2025-3-25 15:54:53 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllongncryption (IBLE). Similar as the case of lossy encryption, we show that IBLE can also achieve selective opening security. Finally, we present a construction of IBLE from the assumption of learning with errors.
25#
發(fā)表于 2025-3-25 20:53:17 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllonghe aid of techniques such as the rebound attack, the Meet-in-the-Middle preimage attack and the multicollisions. Firstly, the preimage attack on 5-round . is proposed which is the first preimage attack for . at the hash function level. Then we extend the (previous) attacks on 5-round . and 6-round .
26#
發(fā)表于 2025-3-26 02:47:56 | 只看該作者
27#
發(fā)表于 2025-3-26 04:49:47 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllonghe 15 regular papers and 4 short papers presented in this volume were carefully reviewed and selected from 53 submissions. They were organized in topical sections named: system security; searchable encryption; cryptanalysis; permutation and symmetric encryption; privacy preserving; hardware security
28#
發(fā)表于 2025-3-26 11:16:56 | 只看該作者
29#
發(fā)表于 2025-3-26 13:25:42 | 只看該作者
30#
發(fā)表于 2025-3-26 17:06:07 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-11 20:01
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
峨山| 九龙坡区| 迁安市| 海宁市| 莱西市| 石城县| 岢岚县| 乌兰浩特市| 利川市| 修武县| 西城区| 合阳县| 康平县| 定西市| 寿光市| 方正县| 澄江县| 浙江省| 和静县| 惠东县| 宁强县| 牡丹江市| 星座| 阆中市| 琼中| 宁远县| 克山县| 樟树市| 咸阳市| 容城县| 孝昌县| 门源| 武宁县| 镇康县| 佛坪县| 凤山市| 临沂市| 叙永县| 邻水| 许昌县| 莒南县|