emission 发表于 2025-3-30 11:57:00

http://reply.papertrans.cn/15/1477/147617/147617_51.png

遗留之物 发表于 2025-3-30 13:07:41

http://reply.papertrans.cn/15/1477/147617/147617_52.png

骚动 发表于 2025-3-30 17:08:25

http://reply.papertrans.cn/15/1477/147617/147617_53.png

Gullible 发表于 2025-3-30 22:49:56

Jean-Bernard Layan,Mihoub Mezouaghie complexity of .(..) bit operations, but is faster by a constant factor. We give a detailed description of the algorithm in characteristic 2 and show that the amount of memory needed for the generation of a secure 200-bit elliptic curve is within the range of current smart card technology.

其他 发表于 2025-3-31 04:20:30

https://doi.org/10.1007/978-3-658-15906-1lving the ECDLP for curves of the size needed in practical cryptographic systems. We show that composite degree extensions of degree divisible by four should be avoided. We also examine the elliptic curves proposed in the Oakley key determination protocol and show that with current technology they remain secure.

paragon 发表于 2025-3-31 07:23:43

http://reply.papertrans.cn/15/1477/147617/147617_56.png

pulse-pressure 发表于 2025-3-31 12:25:54

http://reply.papertrans.cn/15/1477/147617/147617_57.png

竖琴 发表于 2025-3-31 17:23:33

https://doi.org/10.1007/978-3-319-40292-5lasses efficient (yielding short keys) composite schemes exist. Second, we prove that the schedule of the Shoup construction, which is the most efficient composition scheme for universal one-way hash functions known so far, is optimal.

fetter 发表于 2025-3-31 21:10:48

Studies in History and Philosophy of Sciencese of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and non-adaptive security, according to two definitions and in several models of computation. While affirming some prevailing beliefs, we also obtain some unexpected results. Some highlights of our results are:

威胁你 发表于 2025-3-31 23:06:29

https://doi.org/10.1057/9780230523852n SEA, we are able to find secure random curves in characteristic two in much less time than previously reported. In particular we can generate curves widely considered to be as secure as RSA-1024 in less than one minute each on a fast workstation.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Advances in Cryptology – EUROCRYPT 2001; International Confer Birgit Pfitzmann Conference proceedings 2001 Springer-Verlag Berlin Heidelber