alcohol-abuse 发表于 2025-3-23 12:50:30
An Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronur protocol is based on the use of publicly verifiable secret sharing. Under the assumptions related to discrete logarithm and ElGamal cryptosystem, computational bounded players have an incentive not to deviate no matter how adversaries behave.superfluous 发表于 2025-3-23 16:13:31
Visual Cryptography for Natural Images and Visual Voting,ixel expansion, and thus establishes the visual cryptography scheme suitable for natural images. The second part of this paper presents a visual voting scheme that need no counting process and guarantees anonymity.osteoclasts 发表于 2025-3-23 19:04:07
Verifiable Structured Encryption,ability similar to verifiable SSE, but with difference on how a tag for verifiability is defined. This is mainly due to the notions of semi-private data that does not exist in a verifiable SSE scheme. We then present constructions secure under this model and prove security of the constructions.Bravado 发表于 2025-3-23 22:29:30
A General Model for MAC Generation Using Direct Injection,uld prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.字的误用 发表于 2025-3-24 02:54:12
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Ge of 89-bit words memory and 2. keystream bits. This result is better than those in , which possess the complexity of 2. parity checks and 2. bit operations respectively. Moreover, our attack can be divided and computed in parallel, and the actual runtime of the attack can be reduced depending on the number of computers we access.裤子 发表于 2025-3-24 09:52:25
http://reply.papertrans.cn/47/4654/465369/465369_16.png他去就结束 发表于 2025-3-24 12:20:37
Collision Attacks on Variant of OCB Mode and Its Series,shows that: 1) OCB-ZXY still cannot resist against collision attacks. 2) OCB2 and OCB3 also suffer from collision attacks, even more severely than OCB1. 3) Even if OCB2 and OCB3 adopt the ODPBT technique, collision attacks still exist.Memorial 发表于 2025-3-24 16:41:48
http://reply.papertrans.cn/47/4654/465369/465369_18.png陈列 发表于 2025-3-24 21:01:19
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465369.jpgMEN 发表于 2025-3-25 02:22:11
http://reply.papertrans.cn/47/4654/465369/465369_20.png