找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Topics in Cryptology -- CT-RSA 2014; The Cryptographer‘s Josh Benaloh Conference proceedings 2014 Springer International Publishing Switze

[復(fù)制鏈接]
查看: 35302|回復(fù): 35
樓主
發(fā)表于 2025-3-21 17:52:40 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Topics in Cryptology -- CT-RSA 2014
副標(biāo)題The Cryptographer‘s
編輯Josh Benaloh
視頻videohttp://file.papertrans.cn/927/926130/926130.mp4
叢書名稱Lecture Notes in Computer Science
圖書封面Titlebook: Topics in Cryptology -- CT-RSA 2014; The Cryptographer‘s  Josh Benaloh Conference proceedings 2014 Springer International Publishing Switze
描述This book constitutes the refereed proceedings of the Cryptographer‘s Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, in February 2014. The 25 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on non-integral asymmetric functions, public-key encryption, hardware implementations, side-channel attacks, symmetric encryption and cryptanalysis, digital signatures, protocols, hash function cryptanalysis, and applications of cryptographic primitives.
出版日期Conference proceedings 2014
關(guān)鍵詞block and stream ciphers; cryptanalysis and other attacks; cryptographic primitives; cryptography; digit
版次1
doihttps://doi.org/10.1007/978-3-319-04852-9
isbn_softcover978-3-319-04851-2
isbn_ebook978-3-319-04852-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer International Publishing Switzerland 2014
The information of publication is updating

書目名稱Topics in Cryptology -- CT-RSA 2014影響因子(影響力)




書目名稱Topics in Cryptology -- CT-RSA 2014影響因子(影響力)學(xué)科排名




書目名稱Topics in Cryptology -- CT-RSA 2014網(wǎng)絡(luò)公開度




書目名稱Topics in Cryptology -- CT-RSA 2014網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Topics in Cryptology -- CT-RSA 2014被引頻次




書目名稱Topics in Cryptology -- CT-RSA 2014被引頻次學(xué)科排名




書目名稱Topics in Cryptology -- CT-RSA 2014年度引用




書目名稱Topics in Cryptology -- CT-RSA 2014年度引用學(xué)科排名




書目名稱Topics in Cryptology -- CT-RSA 2014讀者反饋




書目名稱Topics in Cryptology -- CT-RSA 2014讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 20:44:37 | 只看該作者
板凳
發(fā)表于 2025-3-22 01:58:45 | 只看該作者
A Generic View on Trace-and-Revoke Broadcast Encryption Schemesold extractable hash proof systems. In particular, he gave instances of his generic revocation scheme from the DDH assumption (which led to the Naor-Pinkas revocation scheme), and from the factoring assumption (which led to a new revocation scheme). We expand on Wee’s work in two directions:.(a) We
地板
發(fā)表于 2025-3-22 06:34:23 | 只看該作者
Broadcast Steganography with a dynamically designated set of receivers, so that the recipients recover the original content, while unauthorized users and outsiders remain . of the covert communication. One of our main technical contributions is the introduction of a new variant of anonymous broadcast encryption that we te
5#
發(fā)表于 2025-3-22 09:42:01 | 只看該作者
Practical Dual-Receiver Encryptionin one shot. We start by defining the crucial . property for DRE, which ensures that two recipients will get the same decryption result. While conceptually simple, DRE with soundness turns out to be a powerful primitive for various goals for PKE, such as complete non-malleability (CNM) and plaintext
6#
發(fā)表于 2025-3-22 16:33:56 | 只看該作者
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulationly used to generate secret keys, hereby exploiting the unique manufacturing variations of an IC. Unfortunately, PUF output bits are not perfectly reproducible and non-uniformly distributed. To obtain a high-quality key, one needs to implement additional post-processing logic on the same IC. Fuzzy ex
7#
發(fā)表于 2025-3-22 19:15:12 | 只看該作者
On Increasing the Throughput of Stream Ciphersing the throughput is to parallelize computations but this usually requires to insert additional memory cells for storing the intermediate results, hence at the expense of an increased hardware size..For stream ciphers with feedback shift registers (FSRs), we present an alternative approach for para
8#
發(fā)表于 2025-3-22 21:19:46 | 只看該作者
9#
發(fā)表于 2025-3-23 02:27:32 | 只看該作者
On the Practical Security of a Leakage Resilient Masking Schemeack targets the manipulation of several, say ., intermediate variables then it is said to be a ..-order one. A privileged way to circumvent this type of attacks is to split any key-dependent variable into . shares, with .?>?., and to adapt the internal processing in order to securely operate on thes
10#
發(fā)表于 2025-3-23 07:19:18 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-6 07:01
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
大新县| 武汉市| 长泰县| 邹平县| 定远县| 平果县| 万全县| 独山县| 平潭县| 攀枝花市| 呼和浩特市| 简阳市| 新疆| 诸城市| 会泽县| 丰原市| 庆元县| 宜丰县| 荆州市| 禹州市| 宁乡县| 遂川县| 景德镇市| 中卫市| 仪陇县| 襄樊市| 奉贤区| 乌兰察布市| 罗山县| 扶余县| 乐都县| 元谋县| 涟水县| 山西省| 和静县| 松江区| 东丽区| 施秉县| 唐海县| 英德市| 阳原县|