AMPLE 发表于 2025-3-30 11:33:59

http://reply.papertrans.cn/25/2407/240611/240611_51.png

analogous 发表于 2025-3-30 14:32:28

The Zope 3 Component Architectureputed is ..(..,...,..) : = .. ·...·.. where each participant .. holds an input .. from the non-commutative group .. The settings of their study are the passive adversary model, information-theoretic security and black-box group operations over ...They presented three results. The first one is that h

palette 发表于 2025-3-30 20:05:42

http://reply.papertrans.cn/25/2407/240611/240611_53.png

anaphylaxis 发表于 2025-3-30 22:02:56

The Zope 3 Component Architecturelikely to increase over time. In order to deal with this issue, one may also require to have the ability to increase the threshold value from . to .′( > .), such an increment is likely to happen several times..In this paper, we study the problem of threshold changeability in a dealer-free environmen

慷慨不好 发表于 2025-3-31 02:28:03

http://reply.papertrans.cn/25/2407/240611/240611_55.png

只有 发表于 2025-3-31 08:41:27

http://reply.papertrans.cn/25/2407/240611/240611_56.png

MENT 发表于 2025-3-31 11:17:22

Presenting components on the web192 bits, the security claim of MV3 is that no attack faster than the exhaustive key search can be mounted for keys of length up to 256 bits..This paper provides a distinguishing attack on the MV3 stream cipher. We will show that the key stream generated in MV3 is distinguishable from random sequenc

ticlopidine 发表于 2025-3-31 16:01:23

http://reply.papertrans.cn/25/2407/240611/240611_58.png

asthma 发表于 2025-3-31 20:46:18

Chosen-Ciphertext Secure Proxy Re-encryption without Pairingsut learning the underlying plaintext. Proxy re-encryption has found many practical applications, such as encrypted email forwarding, secure distributed file systems, and outsourced filtering of encrypted spam. In ACM CCS’07, Canetti and Hohenberger presented a proxy re-encryption scheme with chosen-

patella 发表于 2025-3-31 21:54:48

Hybrid Damgård Is CCA1-Secure under the DDH Assumptionsteen proved its CCA1-security under a more standard but still new and strong assumption. The known CCA2-secure public-key cryptosystems are considerably more complicated. We propose a hybrid variant of Damgård’s public-key cryptosystem and show that it is CCA1-secure if the used symmetric cryptosys
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Cryptology and Network Security; 7th International Co Matthew K. Franklin,Lucas Chi Kwong Hui,Duncan S. Conference proceedings 2008 Spring