BIBLE 发表于 2025-3-26 22:32:28
ID-Based Adaptive Oblivious Transfer all constructed in the setting of public key infrastructure. In this paper, we first introduce the notion of ID-based adaptive oblivious transfer. We also show that a generic construction of ID-based adaptive oblivious transfer can be obtained if there exists an ID-based unique blind signature. Ano真 发表于 2025-3-27 01:29:47
http://reply.papertrans.cn/47/4653/465287/465287_32.pnghermitage 发表于 2025-3-27 07:20:25
http://reply.papertrans.cn/47/4653/465287/465287_33.pngNAG 发表于 2025-3-27 10:06:47
http://reply.papertrans.cn/47/4653/465287/465287_34.png厨房里面 发表于 2025-3-27 14:14:31
http://reply.papertrans.cn/47/4653/465287/465287_35.png光亮 发表于 2025-3-27 18:13:35
Finding Collisions for a 45-Step Simplified HAS-Vlision can be found. This paper describes the method of De Cannière and Rechberger to construct generalized characteristics for SHA-1 in more detail. This method is further generalized and applied to a simplified variant of the HAS-V hash function. Using these techniques, a characteristic for 45 stereject 发表于 2025-3-28 00:33:19
Non-linear Error Detection for Finite State Machinesnder an adversarial model which assumes an advanced attacker with high temporal and spatial fault injection capability. Due to the non-uniform characteristics of FSMs, simple application of the systematic non-linear codes will not provide sufficient protection. As a solution to this problem, we usetenuous 发表于 2025-3-28 04:35:50
http://reply.papertrans.cn/47/4653/465287/465287_38.pngFLINT 发表于 2025-3-28 06:50:27
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structureit is convenient to name it TH. They found that some linearization equations can be derived for TH and to overcome this defect, they combined the internal perturbation and plus methods to obtain an improved scheme which we call PTH+. They claimed that PTH+ can resist all known types of attacks, inclsubordinate 发表于 2025-3-28 12:42:07
https://doi.org/10.1007/978-3-642-10838-9Broadcast; Proxy; access control; anonymity; authentication; calculus; cryptoanalysis; cryptographic protoc