找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Handbuch der praktischen und technischen Informatik; Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllong Book 2000Latest edition Springer-Verlag

[復(fù)制鏈接]
樓主: hedonist
21#
發(fā)表于 2025-3-25 03:44:40 | 只看該作者
22#
發(fā)表于 2025-3-25 10:23:02 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllongara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable sec
23#
發(fā)表于 2025-3-25 14:20:54 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllongpose that for two .-bit RSA moduli . and ., . and . are .-bit primes, . and . share . bits at positions from . to .. Faug.re et al. (PKC 2010) showed that when ., one can factor . and . in polynomial time. In this paper, we improve this bound to . by presenting a new method of solving a homogeneous
24#
發(fā)表于 2025-3-25 15:54:53 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllongncryption (IBLE). Similar as the case of lossy encryption, we show that IBLE can also achieve selective opening security. Finally, we present a construction of IBLE from the assumption of learning with errors.
25#
發(fā)表于 2025-3-25 20:53:17 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllonghe aid of techniques such as the rebound attack, the Meet-in-the-Middle preimage attack and the multicollisions. Firstly, the preimage attack on 5-round . is proposed which is the first preimage attack for . at the hash function level. Then we extend the (previous) attacks on 5-round . and 6-round .
26#
發(fā)表于 2025-3-26 02:47:56 | 只看該作者
27#
發(fā)表于 2025-3-26 04:49:47 | 只看該作者
Ekbert Hering,Jürgen Gutekunst,Ulrich Dyllonghe 15 regular papers and 4 short papers presented in this volume were carefully reviewed and selected from 53 submissions. They were organized in topical sections named: system security; searchable encryption; cryptanalysis; permutation and symmetric encryption; privacy preserving; hardware security
28#
發(fā)表于 2025-3-26 11:16:56 | 只看該作者
29#
發(fā)表于 2025-3-26 13:25:42 | 只看該作者
30#
發(fā)表于 2025-3-26 17:06:07 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-11 20:01
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
泾阳县| 育儿| 托克逊县| 杂多县| 额尔古纳市| 台中市| 海宁市| 长丰县| 收藏| 巫山县| 英吉沙县| 大足县| 应城市| 江门市| 抚宁县| 始兴县| 大庆市| 山丹县| 沾化县| 共和县| 封开县| 迁西县| 邹城市| 钟山县| 乌拉特后旗| 新竹县| 惠安县| 岑溪市| 峨山| 博罗县| 渝中区| 江达县| 石楼县| 固镇县| 图片| 墨脱县| 都匀市| 吴川市| 漳平市| 南汇区| 清苑县|