BIBLE
发表于 2025-3-26 22:32:28
ID-Based Adaptive Oblivious Transfer all constructed in the setting of public key infrastructure. In this paper, we first introduce the notion of ID-based adaptive oblivious transfer. We also show that a generic construction of ID-based adaptive oblivious transfer can be obtained if there exists an ID-based unique blind signature. Ano
真
发表于 2025-3-27 01:29:47
http://reply.papertrans.cn/47/4653/465287/465287_32.png
hermitage
发表于 2025-3-27 07:20:25
http://reply.papertrans.cn/47/4653/465287/465287_33.png
NAG
发表于 2025-3-27 10:06:47
http://reply.papertrans.cn/47/4653/465287/465287_34.png
厨房里面
发表于 2025-3-27 14:14:31
http://reply.papertrans.cn/47/4653/465287/465287_35.png
光亮
发表于 2025-3-27 18:13:35
Finding Collisions for a 45-Step Simplified HAS-Vlision can be found. This paper describes the method of De Cannière and Rechberger to construct generalized characteristics for SHA-1 in more detail. This method is further generalized and applied to a simplified variant of the HAS-V hash function. Using these techniques, a characteristic for 45 ste
reject
发表于 2025-3-28 00:33:19
Non-linear Error Detection for Finite State Machinesnder an adversarial model which assumes an advanced attacker with high temporal and spatial fault injection capability. Due to the non-uniform characteristics of FSMs, simple application of the systematic non-linear codes will not provide sufficient protection. As a solution to this problem, we use
tenuous
发表于 2025-3-28 04:35:50
http://reply.papertrans.cn/47/4653/465287/465287_38.png
FLINT
发表于 2025-3-28 06:50:27
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structureit is convenient to name it TH. They found that some linearization equations can be derived for TH and to overcome this defect, they combined the internal perturbation and plus methods to obtain an improved scheme which we call PTH+. They claimed that PTH+ can resist all known types of attacks, incl
subordinate
发表于 2025-3-28 12:42:07
https://doi.org/10.1007/978-3-642-10838-9Broadcast; Proxy; access control; anonymity; authentication; calculus; cryptoanalysis; cryptographic protoc