最初 发表于 2025-3-25 03:21:33
http://reply.papertrans.cn/47/4654/465380/465380_21.pngPicks-Disease 发表于 2025-3-25 10:22:33
Speeding Up Elliptic Scalar Multiplication with Precomputationlgorithms for such elliptic scalar multiplication. Implementation results on Pentium II and Alpha 21164 microprocessors are also provided to demonstrate the presented improvements in actual implementations.Semblance 发表于 2025-3-25 13:00:11
http://reply.papertrans.cn/47/4654/465380/465380_23.pngarterioles 发表于 2025-3-25 18:48:41
Secure Selection Protocolsg . protocol applications, which will eventually lead to better understanding and refinement of these applications. We present a proposal for a specialised selection protocol with anonymity as the security service. An area for its application is anonymous peer review, where no peer should know the i到婚嫁年龄 发表于 2025-3-26 00:04:03
http://reply.papertrans.cn/47/4654/465380/465380_25.pngPulmonary-Veins 发表于 2025-3-26 00:39:40
A 2-Pass Authentication and Key Agreement Protocol for Mobile Communicationss 1.5-move protocol for air-interface of mobile systems. The paper outlines the new protocol, examines its various aspects, and compares them to those of other 2-pass protocols of the PACS and the 1.5-move protocol.Malfunction 发表于 2025-3-26 06:46:31
http://reply.papertrans.cn/47/4654/465380/465380_27.pngFANG 发表于 2025-3-26 10:56:54
A New Approach to Robust Threshold RSA Signature Schemes threshold signature system is . if it allows generation of correct signatures for a group of . honest participants, and in the presence of malicious participants. The purpose of this paper is two-fold. First we show that a robust (., .) threshold RSA signature scheme, proposed by Rabin in Crypto’98过于光泽 发表于 2025-3-26 16:28:48
http://reply.papertrans.cn/47/4654/465380/465380_29.png是他笨 发表于 2025-3-26 18:38:36
A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signaturew secret sharing schemes and a robust multiplication protocol based on the non-interactive ZK proof. The secret sharing scheme using a hash function can verify the validity of the received data easily, therefore we can reduce the complexity of the protocol. Also we present a robust multiplication pr