corpus-callosum 发表于 2025-3-25 06:01:54
Threshold key-recovery systems for RSA, , no (practical) threshold key-recovery system for the factoring based cryptosystems such as the RSA scheme has been proposed..This paper proposes the first (practical) threshold key-recovery systems for the factoring based cryptosystems including the RSA and Rabin schemes. Almost all offixed-joint 发表于 2025-3-25 09:28:28
http://reply.papertrans.cn/87/8635/863417/863417_22.png慷慨援助 发表于 2025-3-25 12:48:03
Protocols using anonymous connections: Mobile applications,emphasizes high level security goals of key distribution protocols. The contributions of this paper are (1) a notation for describing such protocols, and (2) two protocols for location protected communication over a public infrastructure.Matrimony 发表于 2025-3-25 17:26:54
http://reply.papertrans.cn/87/8635/863417/863417_24.pngembolus 发表于 2025-3-25 21:42:14
Protocol interactions and the chosen protocol attack, using the same key material as a target protocol, which is individually very strong, but which interacts with the target protocol in a security-relevant way. We finish with a brief discussion of design principles to resist this class of attack.Torrid 发表于 2025-3-26 03:26:21
http://reply.papertrans.cn/87/8635/863417/863417_26.png数量 发表于 2025-3-26 05:39:02
0302-9743 istribution of knowledge, electronic voting systems, secure Internet transactions, digital signatures, key exchange, cryprographic protocols, authentication, threshold systems, secret sharing, ect.978-3-540-64040-0978-3-540-69688-9Series ISSN 0302-9743 Series E-ISSN 1611-3349谦卑 发表于 2025-3-26 10:22:54
How to build evidence in a public-key infrastructure for multi-domain environments, can provide to users to facilitate them to buy through the use of PCs, we have to provide them by a sufficiently well founded guarantee that they will be safeguarded against frauds attempts and malicious behaviours. In this paper, we describe which facilities a PEI must provide in order to build the evidence needed to get that guarantee.Irritate 发表于 2025-3-26 15:14:39
Secure books: Protecting the distribution of knowledge,e the X.509 philosophy may be suitable for many electronic commerce applications, signatures on which we may have to rely for many years — such as those on books and contracts — appear to require a different approach.antiandrogen 发表于 2025-3-26 19:57:49
Binding bit patterns to real world entities, ultimately to bind keys to real world entities imposes subtle constraints upon the structure and semantics of EKCs and related entities such as ACLs and capabilities, and upon the role which such entities may play in access control and integrity verification. These do not appear to be adequately realized at present.