Adrenal-Glands 发表于 2025-3-26 23:35:46

An Automatic Security Evaluation System for IPv6 Networkof IPv6 network, IPsec(IP Security) is designed by IPsec Working Group of IETF. IPsec(IP Security) offers not only Internet security service such as Internet secure communication and authentication but also the safe key exchange and anti-replay attack mechanism. Recently, Several Project implement I

Expressly 发表于 2025-3-27 04:24:33

http://reply.papertrans.cn/47/4653/465299/465299_32.png

极端的正确性 发表于 2025-3-27 06:45:08

http://reply.papertrans.cn/47/4653/465299/465299_33.png

CHYME 发表于 2025-3-27 11:12:22

http://reply.papertrans.cn/47/4653/465299/465299_34.png

外来 发表于 2025-3-27 15:02:46

Sign-Based Differential Power Analysis values that collide with the DPA target value within the circuitry. With the help of cross-iteration comparisons, the interpretation of those values can provide significant amounts of the information required to reverse engineer secret algorithm. We have successfully launched a demonstration attack

会犯错误 发表于 2025-3-27 18:08:00

Asymmetric Watermarking Scheme Using Permutation Braidsbedding and detection. In such a scheme, the detector only needs to know a public key, which does not give enough information to make watermark removal possible. The proposed watermarking scheme can match requirements of asymmetric watermarking system. Our experimental result shows that this scheme

Orthodontics 发表于 2025-3-27 23:26:58

Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(,) and GF(2,)f public-key cryptosystems, including elliptic curve systems over prime fields GF(.) and binary fields GF(2.) of arbitrary order. This flexibility is achieved by implementing the cryptographic primitives in software and taking advantage of dedicated instruction set extensions along with special func

马具 发表于 2025-3-28 02:42:35

Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auctionbidders. Relative bid privacy leads to three advantages: high efficiency, the bidding values can be very precise and any auction rule can be applied. A new mix network is designed and applied to implement relative bid privacy efficiently. Two rounds of shuffling are employed in the mix network, so t

Mobile 发表于 2025-3-28 10:10:03

978-3-540-20827-3Springer-Verlag Berlin Heidelberg 2004

异端邪说2 发表于 2025-3-28 11:04:07

Information Security Applications978-3-540-24591-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Security Applications; 4th International Wo Ki-Joon Chae,Moti Yung Conference proceedings 2004 Springer-Verlag Berlin Heidelber