赦免 发表于 2025-3-25 18:04:21

http://reply.papertrans.cn/47/4653/465257/465257_24.png

恃强凌弱 发表于 2025-3-25 20:29:48

http://reply.papertrans.cn/47/4653/465257/465257_25.png

Cabg318 发表于 2025-3-26 04:04:31

Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computationspropose very efficient protocols for implementing addition and multiplication over .(.). Differently than in previous works, in our protocol each step of the computation is verifiable. Moreover, no copying of commitments is necessary, because commitments are not destroyed during the computation. Als

olfction 发表于 2025-3-26 04:29:22

The Design and Implementation of Protocol-Based Hidden Key Recovery the following novel features: (1) The Key recovery channels are “unfilterable” — the key recovery channels cannot be removed without also breaking correct operation of the protocol. (2) Protocol implementations containing our key recovery designs can inter-operate with standard (uncompromised) prot

祖传财产 发表于 2025-3-26 10:03:31

http://reply.papertrans.cn/47/4653/465257/465257_28.png

BILL 发表于 2025-3-26 12:46:05

On the Security of Fair Non-repudiation Protocolsled by several inherent design weaknesses, which also apply to other non-repudiation protocols. To prevent these attacks, we propose generic countermeasures that considerably strengthen the design and implementation of non-repudiation protocols. The application of these countermeasures is finally sh

不规则 发表于 2025-3-26 17:08:17

http://reply.papertrans.cn/47/4653/465257/465257_30.png

祖传 发表于 2025-3-26 22:49:26

Zero-Value Point Attacks on Elliptic Curve Cryptosystemd a variant of DPA using the point (0,.), which is not randomized in Jacobian coordinates or in the isomorphic class. This point often exists in the standard curves, and we have to care this attack. In this paper, we propose the zero-value point attack as an extension of Goubin’s attack. Note that e

较早 发表于 2025-3-27 02:36:16

http://reply.papertrans.cn/47/4653/465257/465257_32.png

thrombus 发表于 2025-3-27 05:30:02

http://reply.papertrans.cn/47/4653/465257/465257_33.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security; 6th International Co Colin Boyd,Wenbo Mao Conference proceedings 2003 Springer-Verlag Berlin Heidelberg 2003 PKI infr