找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security; 9th International Co Sokratis K. Katsikas,Javier López,Bart Preneel Conference proceedings 2006 Springer-Verlag Berli

[復(fù)制鏈接]
樓主: Buren
31#
發(fā)表于 2025-3-26 22:03:36 | 只看該作者
, A Stream Cipher Construction Inspired by Block Cipher Design Principlesed in block ciphers by equivalent stream cipher components. In order to illustrate this approach, we construct a very simple synchronous stream cipher which provides a lot of flexibility for hardware implementations, and seems to have a number of desirable cryptographic properties.
32#
發(fā)表于 2025-3-27 03:48:38 | 只看該作者
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465277.jpg
33#
發(fā)表于 2025-3-27 07:57:29 | 只看該作者
Protecting Data Privacy Through Hard-to-Reverse Negative Databasesast to the single . approach of previous work. Finally, we present a method for creating negative databases that are hard to reverse in practice, i.e., from which it is hard to obtain ., by adapting a technique for generating 3-SAT formulas.
34#
發(fā)表于 2025-3-27 10:18:36 | 只看該作者
35#
發(fā)表于 2025-3-27 17:31:14 | 只看該作者
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumptiondynamic) group structure, revocation facilities...We propose in this article a simple blind ring signature scheme based on pairings on algebraic curves. We formally prove the security (anonymity, blindness and unforgeability) of our scheme in the random oracle model, under quite standard assumptions.
36#
發(fā)表于 2025-3-27 19:22:53 | 只看該作者
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Latticecient than known attacks using Coppersmith techniques. Moreover, we show that the attacks of Wiener and Verheul/Van Tilborg, using continued fractions techniques, are special deterministic cases of our attack, which in general is heuristic.
37#
發(fā)表于 2025-3-28 00:17:58 | 只看該作者
38#
發(fā)表于 2025-3-28 05:23:24 | 只看該作者
Low Latency Anonymity with Mix Ringsouting and batching mixnets – and we use simulation to demonstrate performance advantages of nearly 40% over batching mixnets while protecting against a wider variety of adversaries than onion routing.
39#
發(fā)表于 2025-3-28 07:51:05 | 只看該作者
40#
發(fā)表于 2025-3-28 14:26:09 | 只看該作者
Multi-party Concurrent Signatures scheme for . users. It is an open problem to construct concurrent signature schemes for multi users. In this paper, we answer this open problem affirmatively. Using techniques of ring signatures and bilinear pairings, . we construct a concurrent signature scheme for multi-users.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-26 12:32
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
个旧市| 七台河市| 桐庐县| 汉沽区| 长海县| 珲春市| 青岛市| 绥滨县| 鹤岗市| 六安市| 青川县| 贡嘎县| 巴彦淖尔市| 电白县| 阳西县| 双江| 六枝特区| 霍山县| 贵港市| 阜平县| 海南省| 霸州市| 全椒县| 伊吾县| 遂溪县| 泸西县| 娱乐| 辉县市| 射洪县| 思南县| 时尚| 固镇县| 盐城市| 明光市| 莱州市| 水城县| 汶川县| 丰城市| 新乐市| 鄂州市| 南宁市|