心痛 发表于 2025-3-23 12:32:30
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Familykolić and Biryukov, for finding collisions for 21-step SHA-256 holds with probability 2.. No results on 21-step SHA-512 are previously known. Further, we provide evidence that the Nikolić-Biryukov differential path is unlikely to yield 21-step collisions for SHA-512.Fracture 发表于 2025-3-23 16:19:53
Proxy Re-signatures in the Standard Modelsecure under standard assumption in the standard model. We also discuss how to incorporate the concept of forward-security into the proxy re-signature paradigm, such that the signing and the transformation are both time-limited.PAN 发表于 2025-3-23 19:19:45
http://reply.papertrans.cn/47/4653/465254/465254_13.pngOptimum 发表于 2025-3-23 23:22:19
Property-Based Attestation without a Trusted Third Party such a TTP. We define a formal model, propose an efficient protocol based on the ideas of ring signatures, and prove its security. The cryptographic technique deployed in our protocol is of independent interest, as it shows how ring signatures can be used to efficiently prove the knowledge of an element in a list without disclosing it.FLUSH 发表于 2025-3-24 03:00:15
http://reply.papertrans.cn/47/4653/465254/465254_15.png烦忧 发表于 2025-3-24 06:37:06
0302-9743 aipei, Taiwan, September 15-18, 2008...The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on trusted computing, database and system security, intrusion detection, network security, cryptanalysis, digital signat类人猿 发表于 2025-3-24 10:42:02
http://reply.papertrans.cn/47/4653/465254/465254_17.png掺假 发表于 2025-3-24 15:34:15
http://reply.papertrans.cn/47/4653/465254/465254_18.pngICLE 发表于 2025-3-24 21:26:37
http://reply.papertrans.cn/47/4653/465254/465254_19.png丰富 发表于 2025-3-25 00:41:21
http://reply.papertrans.cn/47/4653/465254/465254_20.png