隐藏 发表于 2025-3-25 03:57:05

Darko Huljenić,Ivana Stupar,Mariano Cecowski the case where randomness is reused across different cryptographic primitives. We find that through the additional binding introduced through randomness reuse, one can actually obtain a . with respect to the standard black-box compositions, and achieve a stronger level of security. We introduce str

bleach 发表于 2025-3-25 10:54:52

Steffen Becker,Sebastian Lehrigure against a certificate authority who has herself selected the RSA modulus .. We generalize previous work and define the root accumulator in modules over Euclidean rings. We prove that the root accumulator is secure under two different pairs of assumptions on the module family and on the used hash

碌碌之人 发表于 2025-3-25 12:08:12

http://reply.papertrans.cn/16/1598/159726/159726_23.png

宣传 发表于 2025-3-25 17:40:26

http://reply.papertrans.cn/16/1598/159726/159726_24.png

ALE 发表于 2025-3-25 21:04:09

Validation of Access Control Systems,re constructed on reduced steps of their compression functions. These lead to 4-sum attacks on 47 steps (out of 64 steps) of RIPEMD-128 and 40 steps (out of 80 steps) of RIPEMD-160. Then new properties called a . and . are considered. The partial 2-dimension sum is generated on 48 steps of RIPEMD-12

insidious 发表于 2025-3-26 03:14:27

http://reply.papertrans.cn/16/1598/159726/159726_26.png

起来了 发表于 2025-3-26 05:26:51

http://reply.papertrans.cn/16/1598/159726/159726_27.png

daredevil 发表于 2025-3-26 08:38:42

Applied Cryptography and Network Security978-3-642-31284-7Series ISSN 0302-9743 Series E-ISSN 1611-3349

ARK 发表于 2025-3-26 15:42:04

http://reply.papertrans.cn/16/1598/159726/159726_29.png

脱水 发表于 2025-3-26 20:35:16

https://doi.org/10.1007/978-3-642-31284-7authentication; cloud computing; data structures; protocols; spam detection
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Applied Cryptography and Network Security; 10th International C Feng Bao,Pierangela Samarati,Jianying Zhou Conference proceedings 2012 Spri