constitute 发表于 2025-3-26 21:55:08

http://reply.papertrans.cn/47/4654/465369/465369_31.png

我不死扛 发表于 2025-3-27 03:23:36

Visual Cryptography for Natural Images and Visual Voting,ges printed on transparencies will reveal the secret. The decryption is done directly by the human visual system without any extra calculations. Most of previous researches essentially handle only binary images, as the underling encoding matrices are all Boolean matrices. For gray-level image, we ne

裤子 发表于 2025-3-27 07:27:45

RCCA Security for KEM+DEM Style Hybrid Encryptions,ity to the most popular hybrid paradigms, KEM+DEM and Tag-KEM/DEM..It is open to construct an RCCA-secure scheme more efficient than CCA-secure ones. In the setting of Tag-KEM, we solve this by presenting a natural RCCA-secure RSA-based Tag-KEM scheme, named as RSA-TKEM, which is more efficient than

傲慢物 发表于 2025-3-27 10:39:59

Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations,ryptosystem as any polynomial equation: . which is satisfied by all such pairs. In this paper, we present a new attack on the multivariate public key cryptosystems from Diophantine equations developed by Gao and Heindl by using the embedded surfaces associated to this family of multivariate cryptosy

推崇 发表于 2025-3-27 16:22:30

Verifiable Structured Encryption,stead of keyword-based search only. Both structured encryption and SSE schemes mainly consider security against passive adversaries, until recently where SSE schemes secure against active adversaries were proposed. This means in addition of querying encrypted data, the adversaries can modify encrypt

笨重 发表于 2025-3-27 17:52:30

,Nested Merkle’s Puzzles against Sampling Attacks,ties the ability to securely and continuously communicate over an unprotected channel. To achieve the continuous security over unbounded communication sessions we propose to use a . Merkle’s puzzles approach where the honest parties repeatedly establish new keys and use previous keys to encrypt the

AMEND 发表于 2025-3-27 22:15:36

http://reply.papertrans.cn/47/4654/465369/465369_37.png

不理会 发表于 2025-3-28 05:01:18

http://reply.papertrans.cn/47/4654/465369/465369_38.png

Emmenagogue 发表于 2025-3-28 10:07:36

http://reply.papertrans.cn/47/4654/465369/465369_39.png

groggy 发表于 2025-3-28 12:33:15

,The Security and Performance of “GCM” when Short Multiplications Are Used Instead, performs rather poorly in modern software implementation because of polynomial hashing in the large field GF(2.) (. denotes the block size of the underlying cipher). This paper investigates whether we can use polynomial hashing in the ring GF(2.) X GF(2.) instead. Such a change would normally compr
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology; 8th International Co Mirosław Kutyłowski,Moti Yung Conference proceedings 2013 Springer-Verlag Berlin