fodlder 发表于 2025-3-23 12:09:56
http://reply.papertrans.cn/15/1476/147600/147600_11.pngBanquet 发表于 2025-3-23 14:09:56
The CMOS Inverter: Analysis and Design,ommunication and a small number of exponentiations). Furthermore the RSA-based structure of our scheme provides with simple and elegant solutions to add several of the more advanced properties of undeniable signatures found in the literature, including convertibility of the undeniable signatures (inAccomplish 发表于 2025-3-23 19:38:11
Dynamic Logic Circuit Concepts, 50% (31%, respectively) less in computation time and 85% (91%, respectively) less in message expansion than does “signature followed by encryption” based on the discrete logarithm problem (factorization problem, respectively).弄污 发表于 2025-3-23 23:10:08
CMOS Differential Logic Families,finite stream which is entirely known to the sender (say a movie). We use this constraint to devise an extremely efficient solution. The second case is for a (potentially infinite) stream which is not known in advance to the sender (for example a live broadcast). We present proofs of security of our厚颜无耻 发表于 2025-3-24 02:35:29
Transmission Gate Logic Circuits,one PKCS. These embeddings can be extended directly to the MTI two-pass protocol, the Girault key agreement protocol, and many other cryptographic systems. These attacks demonstrate a systematic way to mount kleptographic attacks. They also show the vulnerability of systems based on the difficulty o免费 发表于 2025-3-24 08:53:16
Statistical zero knowledge protocols to prove modular polynomial relations,978-1-349-22490-6Oafishness 发表于 2025-3-24 12:29:29
Eliminating decryption errors in the Ajtai-Dwork Cryptosystem,978-1-137-35074-9LIEN 发表于 2025-3-24 15:27:51
A multiplicative attack using LLL algorithm on RSA signatures with redundancy,978-0-230-51274-0除草剂 发表于 2025-3-24 21:18:08
On the security of the KMOV public key cryptosystem,978-3-031-37200-1larder 发表于 2025-3-25 01:34:36
A key recovery attack on discrete log-based schemes using a prime order subgroup,978-1-137-01890-8