diabetes 发表于 2025-3-26 22:03:36

, A Stream Cipher Construction Inspired by Block Cipher Design Principlesed in block ciphers by equivalent stream cipher components. In order to illustrate this approach, we construct a very simple synchronous stream cipher which provides a lot of flexibility for hardware implementations, and seems to have a number of desirable cryptographic properties.

珊瑚 发表于 2025-3-27 03:48:38

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465277.jpg

Feedback 发表于 2025-3-27 07:57:29

Protecting Data Privacy Through Hard-to-Reverse Negative Databasesast to the single . approach of previous work. Finally, we present a method for creating negative databases that are hard to reverse in practice, i.e., from which it is hard to obtain ., by adapting a technique for generating 3-SAT formulas.

多嘴 发表于 2025-3-27 10:18:36

http://reply.papertrans.cn/47/4653/465277/465277_34.png

superfluous 发表于 2025-3-27 17:31:14

Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumptiondynamic) group structure, revocation facilities...We propose in this article a simple blind ring signature scheme based on pairings on algebraic curves. We formally prove the security (anonymity, blindness and unforgeability) of our scheme in the random oracle model, under quite standard assumptions.

发电机 发表于 2025-3-27 19:22:53

A Partial Key Exposure Attack on RSA Using a 2-Dimensional Latticecient than known attacks using Coppersmith techniques. Moreover, we show that the attacks of Wiener and Verheul/Van Tilborg, using continued fractions techniques, are special deterministic cases of our attack, which in general is heuristic.

echnic 发表于 2025-3-28 00:17:58

http://reply.papertrans.cn/47/4653/465277/465277_37.png

Clumsy 发表于 2025-3-28 05:23:24

Low Latency Anonymity with Mix Ringsouting and batching mixnets – and we use simulation to demonstrate performance advantages of nearly 40% over batching mixnets while protecting against a wider variety of adversaries than onion routing.

Explicate 发表于 2025-3-28 07:51:05

http://reply.papertrans.cn/47/4653/465277/465277_39.png

Subjugate 发表于 2025-3-28 14:26:09

Multi-party Concurrent Signatures scheme for . users. It is an open problem to construct concurrent signature schemes for multi users. In this paper, we answer this open problem affirmatively. Using techniques of ring signatures and bilinear pairings, . we construct a concurrent signature scheme for multi-users.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Security; 9th International Co Sokratis K. Katsikas,Javier López,Bart Preneel Conference proceedings 2006 Springer-Verlag Berli