神化怪物 发表于 2025-3-28 17:40:58

http://reply.papertrans.cn/47/4654/465322/465322_41.png

CHYME 发表于 2025-3-28 22:14:39

Improving the Message-Ciphertext Rate of Lewko’s Fully Secure IBE Schemeeling and parameter hiding properties of composite order settings. The security of our scheme is based on the subspace assumption, which can be reduced to the decisional linear assumption. We employ the dual system encryption technique in our security proof.

继承人 发表于 2025-3-29 01:38:57

http://reply.papertrans.cn/47/4654/465322/465322_43.png

树胶 发表于 2025-3-29 06:31:33

0302-9743 ography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks..978-3-642-38032-7978-3-642-38033-4Series ISSN 0302-9743 Series E-ISSN 1611-3349

发表于 2025-3-29 09:02:18

http://reply.papertrans.cn/47/4654/465322/465322_45.png

Vo2-Max 发表于 2025-3-29 13:45:13

http://reply.papertrans.cn/47/4654/465322/465322_46.png

Truculent 发表于 2025-3-29 15:56:51

Conference proceedings 2013d in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks..

invulnerable 发表于 2025-3-29 22:14:19

http://reply.papertrans.cn/47/4654/465322/465322_48.png

反省 发表于 2025-3-30 03:55:59

http://reply.papertrans.cn/47/4654/465322/465322_49.png

IST 发表于 2025-3-30 04:41:25

http://reply.papertrans.cn/47/4654/465322/465322_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security Practice and Experience; 9th International Co Robert H. Deng,Tao Feng Conference proceedings 2013 Springer-Verlag Berl