成份 发表于 2025-3-25 06:37:05

http://reply.papertrans.cn/47/4655/465406/465406_21.png

换话题 发表于 2025-3-25 10:46:11

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465406.jpg

senile-dementia 发表于 2025-3-25 14:01:14

http://reply.papertrans.cn/47/4655/465406/465406_23.png

Decimate 发表于 2025-3-25 17:44:59

http://reply.papertrans.cn/47/4655/465406/465406_24.png

一个姐姐 发表于 2025-3-25 20:52:15

http://reply.papertrans.cn/47/4655/465406/465406_25.png

白杨鱼 发表于 2025-3-26 01:20:24

https://doi.org/10.1007/978-3-540-73458-1Information; Signatur; anonymity; authentication; bilinear pairings; biometrics; block ciphers; communicati

Offbeat 发表于 2025-3-26 04:48:03

A New Strategy for Finding a Differential Path of SHA-1ers. By implementing our new algorithm and doing some experiments on a computer, we actually found 383 differential paths in the joint search that are different from Wang’s. Since it is designed by quite a new policy, our algorithm can search a range of space that was not examined by existing algorithms.

Ankylo- 发表于 2025-3-26 11:01:52

On Building Hash Functions from Multivariate Quadratic Equationse to collision attacks. In this paper, therefore, we describe a mechanism—also using multivariate quadratic polynomials—yielding the collision-free property we seek while retaining provable pre-image resistance. Therefore, . offers an intriguing companion proposal to the provably collision-free hash function ..

anesthesia 发表于 2025-3-26 14:15:44

An Application of the Goldwasser-Micali Cryptosystem to Biometric Authenticationip between a biometric feature and the relevant identity. Relying on the Goldwasser-Micali encryption scheme, we introduce a protocol for biometric-based authentication and prove its security in our security model.

employor 发表于 2025-3-26 19:11:22

Soft Generation of Secure Biometric Keyson achieves maximal possible security. It is also shown that the previously proposed constructions for the Euclidean metric are vulnerable to biometric template reconstruction in the multiple-key scenario.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security and Privacy; 12th Australasian Co Josef Pieprzyk,Hossein Ghodosi,Ed Dawson Conference proceedings 2007 Springer-Verlag