找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Topics in Cryptology -- CT-RSA 2014; The Cryptographer‘s Josh Benaloh Conference proceedings 2014 Springer International Publishing Switze

[復(fù)制鏈接]
查看: 35299|回復(fù): 35
樓主
發(fā)表于 2025-3-21 17:52:40 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Topics in Cryptology -- CT-RSA 2014
副標(biāo)題The Cryptographer‘s
編輯Josh Benaloh
視頻videohttp://file.papertrans.cn/927/926130/926130.mp4
叢書名稱Lecture Notes in Computer Science
圖書封面Titlebook: Topics in Cryptology -- CT-RSA 2014; The Cryptographer‘s  Josh Benaloh Conference proceedings 2014 Springer International Publishing Switze
描述This book constitutes the refereed proceedings of the Cryptographer‘s Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, in February 2014. The 25 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on non-integral asymmetric functions, public-key encryption, hardware implementations, side-channel attacks, symmetric encryption and cryptanalysis, digital signatures, protocols, hash function cryptanalysis, and applications of cryptographic primitives.
出版日期Conference proceedings 2014
關(guān)鍵詞block and stream ciphers; cryptanalysis and other attacks; cryptographic primitives; cryptography; digit
版次1
doihttps://doi.org/10.1007/978-3-319-04852-9
isbn_softcover978-3-319-04851-2
isbn_ebook978-3-319-04852-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer International Publishing Switzerland 2014
The information of publication is updating

書目名稱Topics in Cryptology -- CT-RSA 2014影響因子(影響力)




書目名稱Topics in Cryptology -- CT-RSA 2014影響因子(影響力)學(xué)科排名




書目名稱Topics in Cryptology -- CT-RSA 2014網(wǎng)絡(luò)公開度




書目名稱Topics in Cryptology -- CT-RSA 2014網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Topics in Cryptology -- CT-RSA 2014被引頻次




書目名稱Topics in Cryptology -- CT-RSA 2014被引頻次學(xué)科排名




書目名稱Topics in Cryptology -- CT-RSA 2014年度引用




書目名稱Topics in Cryptology -- CT-RSA 2014年度引用學(xué)科排名




書目名稱Topics in Cryptology -- CT-RSA 2014讀者反饋




書目名稱Topics in Cryptology -- CT-RSA 2014讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 20:44:37 | 只看該作者
板凳
發(fā)表于 2025-3-22 01:58:45 | 只看該作者
A Generic View on Trace-and-Revoke Broadcast Encryption Schemesold extractable hash proof systems. In particular, he gave instances of his generic revocation scheme from the DDH assumption (which led to the Naor-Pinkas revocation scheme), and from the factoring assumption (which led to a new revocation scheme). We expand on Wee’s work in two directions:.(a) We
地板
發(fā)表于 2025-3-22 06:34:23 | 只看該作者
Broadcast Steganography with a dynamically designated set of receivers, so that the recipients recover the original content, while unauthorized users and outsiders remain . of the covert communication. One of our main technical contributions is the introduction of a new variant of anonymous broadcast encryption that we te
5#
發(fā)表于 2025-3-22 09:42:01 | 只看該作者
Practical Dual-Receiver Encryptionin one shot. We start by defining the crucial . property for DRE, which ensures that two recipients will get the same decryption result. While conceptually simple, DRE with soundness turns out to be a powerful primitive for various goals for PKE, such as complete non-malleability (CNM) and plaintext
6#
發(fā)表于 2025-3-22 16:33:56 | 只看該作者
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulationly used to generate secret keys, hereby exploiting the unique manufacturing variations of an IC. Unfortunately, PUF output bits are not perfectly reproducible and non-uniformly distributed. To obtain a high-quality key, one needs to implement additional post-processing logic on the same IC. Fuzzy ex
7#
發(fā)表于 2025-3-22 19:15:12 | 只看該作者
On Increasing the Throughput of Stream Ciphersing the throughput is to parallelize computations but this usually requires to insert additional memory cells for storing the intermediate results, hence at the expense of an increased hardware size..For stream ciphers with feedback shift registers (FSRs), we present an alternative approach for para
8#
發(fā)表于 2025-3-22 21:19:46 | 只看該作者
9#
發(fā)表于 2025-3-23 02:27:32 | 只看該作者
On the Practical Security of a Leakage Resilient Masking Schemeack targets the manipulation of several, say ., intermediate variables then it is said to be a ..-order one. A privileged way to circumvent this type of attacks is to split any key-dependent variable into . shares, with .?>?., and to adapt the internal processing in order to securely operate on thes
10#
發(fā)表于 2025-3-23 07:19:18 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-5 21:27
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
汽车| 托克逊县| 枣庄市| 布尔津县| 常熟市| 邹城市| 辽阳县| 北流市| 华阴市| 婺源县| 永顺县| 遂平县| 鱼台县| 泰来县| 农安县| 吉水县| 江源县| 封丘县| 静安区| 华亭县| 江津市| 仁寿县| 茶陵县| 靖边县| 海南省| 临西县| 措勤县| 平湖市| 德江县| 宣城市| 枞阳县| 祁连县| 慈溪市| 太和县| 五莲县| 盐津县| 津南区| 肇州县| 土默特左旗| 涞源县| 马公市|