BIBLE 发表于 2025-3-26 22:32:28

ID-Based Adaptive Oblivious Transfer all constructed in the setting of public key infrastructure. In this paper, we first introduce the notion of ID-based adaptive oblivious transfer. We also show that a generic construction of ID-based adaptive oblivious transfer can be obtained if there exists an ID-based unique blind signature. Ano

发表于 2025-3-27 01:29:47

http://reply.papertrans.cn/47/4653/465287/465287_32.png

hermitage 发表于 2025-3-27 07:20:25

http://reply.papertrans.cn/47/4653/465287/465287_33.png

NAG 发表于 2025-3-27 10:06:47

http://reply.papertrans.cn/47/4653/465287/465287_34.png

厨房里面 发表于 2025-3-27 14:14:31

http://reply.papertrans.cn/47/4653/465287/465287_35.png

光亮 发表于 2025-3-27 18:13:35

Finding Collisions for a 45-Step Simplified HAS-Vlision can be found. This paper describes the method of De Cannière and Rechberger to construct generalized characteristics for SHA-1 in more detail. This method is further generalized and applied to a simplified variant of the HAS-V hash function. Using these techniques, a characteristic for 45 ste

reject 发表于 2025-3-28 00:33:19

Non-linear Error Detection for Finite State Machinesnder an adversarial model which assumes an advanced attacker with high temporal and spatial fault injection capability. Due to the non-uniform characteristics of FSMs, simple application of the systematic non-linear codes will not provide sufficient protection. As a solution to this problem, we use

tenuous 发表于 2025-3-28 04:35:50

http://reply.papertrans.cn/47/4653/465287/465287_38.png

FLINT 发表于 2025-3-28 06:50:27

Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structureit is convenient to name it TH. They found that some linearization equations can be derived for TH and to overcome this defect, they combined the internal perturbation and plus methods to obtain an improved scheme which we call PTH+. They claimed that PTH+ can resist all known types of attacks, incl

subordinate 发表于 2025-3-28 12:42:07

https://doi.org/10.1007/978-3-642-10838-9Broadcast; Proxy; access control; anonymity; authentication; calculus; cryptoanalysis; cryptographic protoc
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Information Security Applications; 10th International W Heung Youl Youm,Moti Yung Conference proceedings 2009 Springer-Verlag Berlin Heidel