WITH 发表于 2025-3-28 17:01:21

http://reply.papertrans.cn/47/4654/465360/465360_41.png

fetter 发表于 2025-3-28 21:46:42

http://reply.papertrans.cn/47/4654/465360/465360_42.png

Parameter 发表于 2025-3-29 00:47:52

Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems, .) shares (typically, each of size comparable to the original secret key). In these schemes, a quorum of at least (. ≤ .) servers needs to act upon a message to produce the result (decrypted value or signature), while corrupting less than . servers maintains the scheme’s security. For about two dec

stratum-corneum 发表于 2025-3-29 04:34:18

Cryptanalysis vs. Provable Security,aring cryptanalysis results and provable security results on a variety of topics. We argue that security is complex, and that there is much to gain from better interaction between cryptanalysis and provable security.

Contend 发表于 2025-3-29 11:15:58

http://reply.papertrans.cn/47/4654/465360/465360_45.png

杀虫剂 发表于 2025-3-29 14:04:51

Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs,nlinear shift registers are equivalent, i.e., whether they generate the same set of output sequences. We define a dependence graph of a shift register and it is a directed acyclic graph related to the shift register. We show that existence of a dependence graph with a special property of a nonlinear

crease 发表于 2025-3-29 16:49:36

http://reply.papertrans.cn/47/4654/465360/465360_47.png

ORE 发表于 2025-3-29 20:32:43

Adleman-Manders-Miller Root Extraction Method Revisited, not shown enough details. Actually, there is a dramatic difference between the square root extraction and the general .th root extraction because one has to solve discrete logarithms for .th root extraction. In this paper, we clarify their method and analyze its complexity. Our heuristic presentati

Eructation 发表于 2025-3-30 01:21:35

http://reply.papertrans.cn/47/4654/465360/465360_49.png

笨重 发表于 2025-3-30 06:38:03

http://reply.papertrans.cn/47/4654/465360/465360_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security and Cryptology; 7th International Co Chuan-Kun Wu,Moti Yung,Dongdai Lin Conference proceedings 2012 Springer-Verlag Be