音乐学者 发表于 2025-3-23 12:44:12

http://reply.papertrans.cn/15/1477/147602/147602_11.png

DEBT 发表于 2025-3-23 17:55:43

http://reply.papertrans.cn/15/1477/147602/147602_12.png

cardiac-arrest 发表于 2025-3-23 19:54:48

https://doi.org/10.1007/978-3-642-75991-8the braid groups can serve as a good source to enrich cryptography. The feature that makes the braid groups useful to cryptography includes the followings: (i) The word problem is solved via a fast algorithm which computes the canonical form which can be efficiently manipulated by computers. (ii) Th

大方不好 发表于 2025-3-24 01:46:58

Molecular Biology of Cannabinoid Receptors,previous attacks, these techniques will work when the MAC calculation involves prefixing the data to be MACed with a ‘length block’. These attack methods provide new (tighter) upper bounds on the level of security offered by the MacDES technique.

somnambulism 发表于 2025-3-24 04:58:01

http://reply.papertrans.cn/15/1477/147602/147602_15.png

anthropologist 发表于 2025-3-24 06:35:07

Cannabis Laboratory Fundamentalseme is provably secure in the random oracle model, assuming that inverting RSA is hard. In this paper we exhibit a slightly di.erent proof which provides a tighter security reduction. This in turn improves the e.ciency of the scheme since smaller RSA moduli can be used for the same level of security

DUCE 发表于 2025-3-24 11:42:04

http://reply.papertrans.cn/15/1477/147602/147602_17.png

tackle 发表于 2025-3-24 15:29:44

Anabel Ternès,Ian Towers,Eva Kuprella a signature’s originator can be revealed (only) by a designated entity. The interactive counterparts of group signatures are identity escrow schemes or group identification scheme with revocable anonymity. This work introduces a new provably secure group signature and a companion identity escrow sc

Adherent 发表于 2025-3-24 20:49:50

Anabel Ternès,Ian Towers,Eva Kuprellaion date, collateral conditions, or whatever) in the resulting signatures under some agreement with the receiver. This paper formalizes such a notion and presents secure and efficient schemes based on a widely applicable method of obtaining witness indistinguishable protocols. We then give a formal

achlorhydria 发表于 2025-3-25 01:27:16

J. David Carey,S. Ravi P. Silvaging the hash value. Moreover, examples of hash functions “with a trapdoor” within this family are given. Due to these weaknesses one should impose at least certain restrictions on the allowed parameter values when using the SL.(.) hashing scheme for cryptographic purposes.
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Advances in Cryptology - CRYPTO 2000; 20th Annual Internat Mihir Bellare Conference proceedings 2000 Springer-Verlag Berlin Heidelberg 2000