最后一个 发表于 2025-3-28 15:44:38

http://reply.papertrans.cn/15/1475/147482/147482_41.png

DIS 发表于 2025-3-28 19:22:52

http://reply.papertrans.cn/15/1475/147482/147482_42.png

国家明智 发表于 2025-3-29 00:47:55

An Inverse-Free Single-Keyed Tweakable Enciphering Scheme978-1-349-06588-2

软弱 发表于 2025-3-29 07:08:15

Public Verifiability in the Covert Model (Almost) for Free978-3-319-58547-5

eucalyptus 发表于 2025-3-29 08:06:51

Traditional Methods of Appraisal, questions in this paper: . . .? To answer this question, we consider all those length-preserving encryption schemes, called ., for which only nonlinear operations are block-functions. Here, we prove the following results for these encryption schemes:

易受刺激 发表于 2025-3-29 15:26:41

http://reply.papertrans.cn/15/1475/147482/147482_46.png

Muffle 发表于 2025-3-29 19:08:57

http://reply.papertrans.cn/15/1475/147482/147482_47.png

Myocyte 发表于 2025-3-29 23:48:58

Conference proceedings 2015ptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. ..The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and ha

本能 发表于 2025-3-30 00:08:31

0302-9743 rence on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. ..The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on in

狂怒 发表于 2025-3-30 07:51:55

Conference proceedings 2015 number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices..
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Advances in Cryptology – ASIACRYPT 2015; 21st International C Tetsu Iwata,Jung Hee Cheon Conference proceedings 2015 International Associat