先兆 发表于 2025-4-1 04:08:07

Capacity Theory on Algebraic Curvesextra information called a .. It is desirable that the sketch reveals little information about the biometric templates even in the worst case (i.e., the . should be low). The main difficulty is that many biometric templates are represented as points in continuous domains with unknown distributions,

VEN 发表于 2025-4-1 07:00:35

https://doi.org/10.1007/BFb0084525rime fields and suitable for cryptography. Since low class number might be seen as a potential threat, it is of interest to push the method as far as possible. We have thus designed a new algorithm for the construction of CM invariants of genus 2 curves, using 2-adic lifting of an input curve over a

爱好 发表于 2025-4-1 13:11:57

Introduction and Research Questions,. can speed up significantly scalar multiplication on those elliptic curves where multiplication by one base (say .) is fast. This is the case in particular of Koblitz curves and supersingular curves, where scalar multiplication can now be achieved in .(log.) curve additions..Previous literature dea

cinder 发表于 2025-4-1 14:46:44

Introduction and Research Questions,, we extend Waters’ IBE protocol to a hierarchical IBE (HIBE) protocol which is secure in the full model without random oracle. The only previous construction in the same setting is due to Waters. Our construction improves upon Waters’ HIBE by significantly reducing the number of public parameters.

随意 发表于 2025-4-1 21:45:55

https://doi.org/10.1007/978-3-319-00843-1 extended properties such as forward-security and keyword- searchability. Our forward-secure broadcast encryption schemes have small ciphertext and private key sizes, in particular, independent of the number of users in the system. One of our best two constructions achieves ciphertexts of constant s

宽度 发表于 2025-4-1 23:53:59

http://reply.papertrans.cn/15/1475/147475/147475_66.png

可耕种 发表于 2025-4-2 04:15:53

,Singapore’s Response to Covid-19,. These generators have the attractive feature of provable pseudorandomness security assuming the hardness of the RSA inversion problem. However, despite extensive study, the most efficient provably secure RSA-based generators output asymptotically only at most .(log.) bits per multiply modulo an RS

过多 发表于 2025-4-2 10:30:45

Capacity-Building in a Post-SARS World,rther arguments in support of the security of OAEP. We first show that partial instantiations, where one of the two random oracles used in OAEP is instantiated by a function family, can be provably secure (still in the random oracle model). For various security statements about OAEP we specify suffi
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Advances in Cryptology -- ASIACRYPT 2006; 12th International C Xuejia Lai,Kefei Chen Conference proceedings 2006 Springer-Verlag Berlin Hei