forthy 发表于 2025-3-30 11:41:10

http://reply.papertrans.cn/47/4653/465255/465255_51.png

Aesthete 发表于 2025-3-30 12:51:31

Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? used, and, where this is not possible, a stream cipher would appear to be a superior choice. This raises a major question mark over the future use of CBC mode, except as part of a more complex mode designed to provide authenticated encryption.

kyphoplasty 发表于 2025-3-30 19:16:32

Chaum’s Designated Confirmer Signature Revisitedty properties of an existentially forgeable undeniable signature scheme. The existence of this cryptographic primitive is shown equivalent to the existence of public-key cryptosystems. It is also interesting to see that this article confirms the security of Chaum’s scheme since our construction is a natural generalization of this scheme.

Allure 发表于 2025-3-30 22:33:25

http://reply.papertrans.cn/47/4653/465255/465255_54.png

可互换 发表于 2025-3-31 01:07:04

http://reply.papertrans.cn/47/4653/465255/465255_55.png

Fibrillation 发表于 2025-3-31 08:38:11

http://reply.papertrans.cn/47/4653/465255/465255_56.png

PAD416 发表于 2025-3-31 12:07:27

Time-Based Release of Confidential Information in Hierarchical Settings the subsequent publication of corresponding short decryption keys, at a predetermined time, so that users can rapidly access the confidential information. This paper presents and analyzes the efficiency of a novel HTIR scheme.

没血色 发表于 2025-3-31 15:17:40

“Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery layers, and then as we move from layer to layer. We believe that such a structured approach, based on layers and trust components, can help designers of security critical applications produce demonstrably robust and verifiable systems that people will not hesitate to use.

TAIN 发表于 2025-3-31 20:24:36

http://reply.papertrans.cn/47/4653/465255/465255_59.png

CREST 发表于 2025-3-31 22:32:34

http://reply.papertrans.cn/47/4653/465255/465255_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Information Security; 8th International Co Jianying Zhou,Javier Lopez,Feng Bao Conference proceedings 2005 Springer-Verlag Berlin Heidelber