trigger 发表于 2025-3-26 23:53:42

Information Security and Privacy978-3-319-19962-7Series ISSN 0302-9743 Series E-ISSN 1611-3349

Hyperlipidemia 发表于 2025-3-27 03:26:00

IBE Under ,-LIN with Shorter Ciphertexts and Private KeysMany identity-based encryption schemes under the .-LIN assumption contain . group elements in the ciphertext overhead and private keys. In this paper,. The shortened size inherently leads to less exponentiations and pairings in encryption and decryption, and hence yielding schemes with better computational efficiency under .-LIN.

extinguish 发表于 2025-3-27 08:21:06

http://reply.papertrans.cn/47/4655/465409/465409_33.png

鉴赏家 发表于 2025-3-27 12:24:36

Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemesattacks against these schemes, showing that HCTR, HCHp and HCHfp suffer related-key attack and XCB and HCH can resist related-key attack under the assumption that the underlying block cipher resists related-key attack.

Enthralling 发表于 2025-3-27 14:55:41

http://reply.papertrans.cn/47/4655/465409/465409_35.png

垄断 发表于 2025-3-27 20:51:33

http://reply.papertrans.cn/47/4655/465409/465409_36.png

olfction 发表于 2025-3-27 23:38:39

Cryptanalysis of Reduced-Round ,omponents of ., including semi-free-start and free-start (near) collision attacks on the compression function, and a limited-birthday distinguisher on the inner permutation. As far as we know, our results are currently the best cryptanalysis on ..

工作 发表于 2025-3-28 04:37:58

http://reply.papertrans.cn/47/4655/465409/465409_38.png

与野兽博斗者 发表于 2025-3-28 07:19:43

Conference proceedings 2015n Brisbane, QLD, Australia, in June/July 2015..The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures

hypotension 发表于 2025-3-28 11:08:38

Conference proceedings 2015sions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation..
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Information Security and Privacy; 20th Australasian Co Ernest Foo,Douglas Stebila Conference proceedings 2015 Springer International Publis