最初 发表于 2025-3-25 03:21:33

http://reply.papertrans.cn/47/4654/465380/465380_21.png

Picks-Disease 发表于 2025-3-25 10:22:33

Speeding Up Elliptic Scalar Multiplication with Precomputationlgorithms for such elliptic scalar multiplication. Implementation results on Pentium II and Alpha 21164 microprocessors are also provided to demonstrate the presented improvements in actual implementations.

Semblance 发表于 2025-3-25 13:00:11

http://reply.papertrans.cn/47/4654/465380/465380_23.png

arterioles 发表于 2025-3-25 18:48:41

Secure Selection Protocolsg . protocol applications, which will eventually lead to better understanding and refinement of these applications. We present a proposal for a specialised selection protocol with anonymity as the security service. An area for its application is anonymous peer review, where no peer should know the i

到婚嫁年龄 发表于 2025-3-26 00:04:03

http://reply.papertrans.cn/47/4654/465380/465380_25.png

Pulmonary-Veins 发表于 2025-3-26 00:39:40

A 2-Pass Authentication and Key Agreement Protocol for Mobile Communicationss 1.5-move protocol for air-interface of mobile systems. The paper outlines the new protocol, examines its various aspects, and compares them to those of other 2-pass protocols of the PACS and the 1.5-move protocol.

Malfunction 发表于 2025-3-26 06:46:31

http://reply.papertrans.cn/47/4654/465380/465380_27.png

FANG 发表于 2025-3-26 10:56:54

A New Approach to Robust Threshold RSA Signature Schemes threshold signature system is . if it allows generation of correct signatures for a group of . honest participants, and in the presence of malicious participants. The purpose of this paper is two-fold. First we show that a robust (., .) threshold RSA signature scheme, proposed by Rabin in Crypto’98

过于光泽 发表于 2025-3-26 16:28:48

http://reply.papertrans.cn/47/4654/465380/465380_29.png

是他笨 发表于 2025-3-26 18:38:36

A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signaturew secret sharing schemes and a robust multiplication protocol based on the non-interactive ZK proof. The secret sharing scheme using a hash function can verify the validity of the received data easily, therefore we can reduce the complexity of the protocol. Also we present a robust multiplication pr
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology - ICISC‘99; Second International JooSeok Song Conference proceedings 2000 Springer-Verlag Berlin Heidel