说明 发表于 2025-3-28 15:55:19

http://reply.papertrans.cn/47/4660/465907/465907_41.png

缩影 发表于 2025-3-28 21:31:17

http://reply.papertrans.cn/47/4660/465907/465907_42.png

和蔼 发表于 2025-3-29 02:17:32

http://reply.papertrans.cn/47/4660/465907/465907_43.png

CHECK 发表于 2025-3-29 06:11:09

http://reply.papertrans.cn/47/4660/465907/465907_44.png

祖先 发表于 2025-3-29 09:52:21

Collision Attack for the Hash Function Extended MD4e differential path hold. Then by using some precise message modification techniques to improve the success probability of the attack, we find two-block collisions of Extended MD4 with less than 2. computations. This work provides a new reference to the collision analysis of other hash functions such as RIPEMD-160 etc. which consist of two lines.

oxidant 发表于 2025-3-29 11:31:34

http://reply.papertrans.cn/47/4660/465907/465907_46.png

弓箭 发表于 2025-3-29 18:24:28

Ideal Secret Sharing Schemes with Share SelectabilityTassa in TCC2004 (or its full version (J. Cryptology2007)). If all selectable shares are randomly chosen, then our schemes are perfect. Finally, we discuss the effect of the leakage information of the secret if a weak secret is indicated as a selectable share.

钢笔尖 发表于 2025-3-29 20:17:23

0302-9743 national Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital

subacute 发表于 2025-3-30 03:35:13

http://reply.papertrans.cn/47/4660/465907/465907_49.png

Servile 发表于 2025-3-30 06:15:08

http://reply.papertrans.cn/47/4660/465907/465907_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information and Communication Security; 13th International C Sihan Qing,Willy Susilo,Dongmei Liu Conference proceedings 2011 Springer-Verla