Small-Intestine 发表于 2025-3-26 22:42:49

http://reply.papertrans.cn/47/4655/465401/465401_31.png

侵蚀 发表于 2025-3-27 03:09:20

http://reply.papertrans.cn/47/4655/465401/465401_32.png

Factorable 发表于 2025-3-27 09:01:21

http://reply.papertrans.cn/47/4655/465401/465401_33.png

Embolic-Stroke 发表于 2025-3-27 11:17:46

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465401.jpg

indoctrinate 发表于 2025-3-27 16:25:36

http://reply.papertrans.cn/47/4655/465401/465401_35.png

Affectation 发表于 2025-3-27 21:42:08

http://reply.papertrans.cn/47/4655/465401/465401_36.png

最低点 发表于 2025-3-27 23:09:35

http://reply.papertrans.cn/47/4655/465401/465401_37.png

milligram 发表于 2025-3-28 04:10:44

A new hash function based on block cipher,me utilizes a single underlying block cipher and can completely resist target attack, collision attack and semi-free-start collision attack. The new scheme can be expected to have ideal computational security against five attacks when the underlying cipher is assumed to have no weakness.

两种语言 发表于 2025-3-28 08:33:37

Secret sharing with reusable polynomials,he reconstruction of multiple secrets, shareholders can dynamically join or leave without distributing new shares to the existing shareholders, and shares can be individually verified during both share distribution and secret recovery.

Eructation 发表于 2025-3-28 13:56:43

http://reply.papertrans.cn/47/4655/465401/465401_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Security and Privacy; Second Australasian Vijay Varadharajan,Josef Pieprzyk,Yi Mu Conference proceedings 1997 Springer-Verlag