横条 发表于 2025-3-25 03:42:27

A Proposal of a New Public Key Cryptosystem Using Matrices over a Ringem is similar to GGH(O. Goldreich, S. Goldwasser, and S. Halevi) cryptosystem but the attack which breaks the GGH system is not applicable to ours. The security of the new construction is based on the computational difficulty of integer factorizations.

inveigh 发表于 2025-3-25 10:47:21

http://reply.papertrans.cn/47/4655/465404/465404_22.png

愚笨 发表于 2025-3-25 15:40:39

http://reply.papertrans.cn/47/4655/465404/465404_23.png

Common-Migraine 发表于 2025-3-25 18:37:15

http://reply.papertrans.cn/47/4655/465404/465404_24.png

REP 发表于 2025-3-25 20:21:06

http://reply.papertrans.cn/47/4655/465404/465404_25.png

BILE 发表于 2025-3-26 00:19:35

http://reply.papertrans.cn/47/4655/465404/465404_26.png

不理会 发表于 2025-3-26 05:48:27

An Implementation of Bitsliced DES on the Pentium MMXTM Processorplementation specifics are discussed and comparisons made with an optimised C-coded DES implementation and an assembly language DES implementation. This paper sets the scene for future research of the inter-relation between design and implementation of the newer 128-bit symmetric block ciphers.

absorbed 发表于 2025-3-26 12:14:03

Securing Large E-Commerce Networks Commerce (E-commerce). To fulfil the future requirements of E-commerce the CoCs need a secure communication channel between each other and the ability to ensure electronic documents of customers to be verified by any third party. In this paper we present a new Trusted Third Party (TTP) service whic

auxiliary 发表于 2025-3-26 16:06:24

Passive Entities: A Strategy for Electronic Payment Designchemes are designed so that the bank is off-line during the actual payment between the customer and the merchant. This paper introduces the concept of passive entities which allows the protocol designer to allocate the level of processing required by an entity during a particular phase of the paymen

chondromalacia 发表于 2025-3-26 20:16:25

http://reply.papertrans.cn/47/4655/465404/465404_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security and Privacy; 5th Australasian Con E. P. Dawson,A. Clark,Colin Boyd Conference proceedings 2000 Springer-Verlag Berlin