Affection 发表于 2025-3-23 09:44:54

http://reply.papertrans.cn/87/8634/863374/863374_11.png

桉树 发表于 2025-3-23 15:34:20

http://reply.papertrans.cn/87/8634/863374/863374_12.png

隐藏 发表于 2025-3-23 18:05:06

http://reply.papertrans.cn/87/8634/863374/863374_13.png

LIKEN 发表于 2025-3-24 00:22:46

http://reply.papertrans.cn/87/8634/863374/863374_14.png

叫喊 发表于 2025-3-24 05:01:13

An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings. Proxy multi-signature is an extension of the basic proxy signature primitive, and permits two or more entities to delegate their signing capabilities to some other entity. Many identity-based proxy multi signature (IBPMS) schemes using bilinear pairings have been proposed. But the relative computa

Mendacious 发表于 2025-3-24 09:27:27

Distributed Signcryption Schemes with Formal Proof of Securityproposed . But formal security models and security proofs have not been presented in any of these schemes..In this paper, we propose formal security model for distributed signcryption for confidentiality and unforgeability. We also modify schemes proposed by Mu & Varadharajan  and Gupta e

撕裂皮肉 发表于 2025-3-24 11:22:26

Identity Based Online/Offline Encryption and Signcryption Schemes Revisitedation to the base station where the computational power is not limited. The most obvious way is to split each and every cryptographic operations into resource consuming, heavy operations and the fast light weight operations. This concept can be efficiently implemented through online/offline cryptogr

infelicitous 发表于 2025-3-24 15:21:01

“Rank Correction”: A New Side-Channel Approach for Secret Key RecoveryA on a cryptographic algorithm like the Data Encryption Standard (DES), the rank of the secret key displays a specific behaviour with regards to other hypotheses. Hence the Rank Corrector algorithm is devised, in order to improve existing SCAs by exploiting such behaviours. With a profiling phase on

商品 发表于 2025-3-24 22:40:22

A Cache Trace Attack on CAMELLIAattacks. In this paper we present an attack on CAMELLIA, which utilizes cache access patterns along with the differential properties of CAMELLIA’s s-boxes. The attack, when implemented on a PowerPC microprocessor having a 32 byte cache line size requires power traces from 2. different encryptions. F

杂色 发表于 2025-3-25 01:18:54

http://reply.papertrans.cn/87/8634/863374/863374_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Security Aspects in Information Technology; First International Marc Joye,Debdeep Mukhopadhyay,Michael Tunstall Conference proceedings 201