Rankle 发表于 2025-3-25 04:24:19

Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long Hashcodecurity strength. Our proposed method can be applied to mechanisms like KCDSA, SDSA, EC-KCDSA, and EC-SDSA in ISO/IEC 14888-3: Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms.

贪心 发表于 2025-3-25 08:05:36

http://reply.papertrans.cn/87/8635/863434/863434_22.png

裁决 发表于 2025-3-25 14:03:42

Improving the ISO/IEC 11770 Standard for Key Management Techniquest protocols, for 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard.

BIAS 发表于 2025-3-25 17:12:08

http://reply.papertrans.cn/87/8635/863434/863434_24.png

丑恶 发表于 2025-3-25 22:58:46

http://reply.papertrans.cn/87/8635/863434/863434_25.png

Inferior 发表于 2025-3-26 00:39:29

http://reply.papertrans.cn/87/8635/863434/863434_26.png

Brain-Waves 发表于 2025-3-26 06:48:18

http://reply.papertrans.cn/87/8635/863434/863434_27.png

Fortify 发表于 2025-3-26 09:26:40

http://reply.papertrans.cn/87/8635/863434/863434_28.png

lattice 发表于 2025-3-26 12:55:46

Blinded Diffie-Hellmanas better performance than alternative protocols; it avoids the payer’s device having to support signature algorithms with dedicated hashes and it has a security proof given in . The new protocol does not appear in any standards known to the authors.

champaign 发表于 2025-3-26 19:38:08

Security Goals and Evolving Standardsint of view of security. This criterion is supported by rigorous protocol analysis tools. We also show that the same idea is applicable even when some approaches to mitigating the flaw require cooperation between the protocol and its application-level caller.
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Security Standardisation Research; First International Liqun Chen,Chris Mitchell Conference proceedings 2014 Springer International Publis