名字 发表于 2025-3-30 10:03:22

http://reply.papertrans.cn/47/4658/465746/465746_51.png

大炮 发表于 2025-3-30 13:29:51

http://reply.papertrans.cn/47/4658/465746/465746_52.png

conifer 发表于 2025-3-30 19:55:07

On the Security of Pseudorandomized Information-Theoretically Secure Schemes in a protocol can be replaced with pseudorandomness in an indistinguishable way for an adversary even if his algorithm has unbounded complexity. However, their argument was applied only to some special protocols. In this article, we first show that their argument is not effective for a wide class o

Slit-Lamp 发表于 2025-3-31 00:28:21

http://reply.papertrans.cn/47/4658/465746/465746_54.png

不能根除 发表于 2025-3-31 01:26:14

On the Optimization of Bipartite Secret Sharing Schemesrticipants in each part play an equivalent role. The bipartite access structures that admit an ideal secret sharing scheme have been characterized, but it is not known which is the optimal complexity of non-ideal bipartite access structures. By using the connection between secret sharing schemes and

解脱 发表于 2025-3-31 05:42:10

http://reply.papertrans.cn/47/4658/465746/465746_56.png

meditation 发表于 2025-3-31 10:14:34

http://reply.papertrans.cn/47/4658/465746/465746_57.png

进入 发表于 2025-3-31 14:31:53

http://reply.papertrans.cn/47/4658/465746/465746_58.png

流动性 发表于 2025-3-31 17:47:42

Cryptanalysis of Secure Message Transmission Protocols with Feedbackceiver to the sender can be used to reduce the requirements of network connectivity. We observe that the way how feedbacks were used in previous work does not guarantee perfect privacy to the transmitted message, when the adversary performs a .. In this paper, we shall describe our new Guessing Atta

ambivalence 发表于 2025-4-1 00:21:42

http://reply.papertrans.cn/47/4658/465746/465746_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Information Theoretic Security; 4th International Co Kaoru Kurosawa Conference proceedings 2010 Springer-Verlag Berlin Heidelberg 2010 DES.