要求比…更好 发表于 2025-3-30 11:01:31

Pairing-Based Cryptography at High Security Levelss area was the elegant solution by Boneh and Franklin of the problem of efficient identity-based encryption. At the same time, the security standards for public key cryptosystems are expected to increase, so that in the future they will be capable of providing security equivalent to 128-, 192-,

Debility 发表于 2025-3-30 16:10:47

http://reply.papertrans.cn/25/2406/240568/240568_52.png

赔偿 发表于 2025-3-30 18:51:11

http://reply.papertrans.cn/25/2406/240568/240568_53.png

通便 发表于 2025-3-31 00:31:14

A Trellis-Based Bound on (2,1)-Separating Codes codes find applications in digital fingerprinting and broadcast encryption for example. We conjecture some bounds on the higher weights, whose proof would considerably strengthen the upper bound on the rate of (2,1)-separating codes.

Coordinate 发表于 2025-3-31 02:19:51

http://reply.papertrans.cn/25/2406/240568/240568_55.png

分开 发表于 2025-3-31 05:45:54

http://reply.papertrans.cn/25/2406/240568/240568_56.png

Classify 发表于 2025-3-31 11:33:26

Hash Based Digital Signature Schemesplications, but their importance may increase if ever a practical quantum computer was built. We discuss issues related to both their implementation and their security. As far as we are aware this is the first complete treatment of practical implementations of hash based signature schemes in the lit

Manifest 发表于 2025-3-31 16:28:37

A General Construction for Simultaneous Signing and Encryptingology of Cramer and Shoup combined with a secure signature scheme..We describe an instantiation of our construction that provides all the functionality of a signature scheme and of an encryption scheme. This instantiation is more efficient than similar constructions proposed to-date.

悲痛 发表于 2025-3-31 18:37:21

http://reply.papertrans.cn/25/2406/240568/240568_59.png

arousal 发表于 2025-3-31 23:01:27

http://reply.papertrans.cn/25/2406/240568/240568_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Cryptography and Coding; 10th IMA Internation Nigel P. Smart Conference proceedings 2005 Springer-Verlag Berlin Heidelberg 2005 Signcryptio