OFF 发表于 2025-3-28 18:20:50

Secure Authentication with Multiple Parallel Keysions involving symmetric cryptography put the global shared secret in every verification device. We propose a more robust solution using Multiple Parallel Keys: use . symmetric keys to authenticate, and give each verification device only one of them.

高尔夫 发表于 2025-3-28 22:36:10

An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithmsncryption of) .-th roots. So far, all the VESs for discrete logarithms are inefficient, but there exists an efficient VES for .-th roots. In this paper, we presents an efficient VES for discrete logarithms and prove its security.

Hectic 发表于 2025-3-29 01:08:35

http://reply.papertrans.cn/87/8687/868623/868623_43.png

GLUE 发表于 2025-3-29 06:57:20

http://reply.papertrans.cn/87/8687/868623/868623_44.png

珍奇 发表于 2025-3-29 09:33:51

Jean-François Dhem,François Koeune,Philippe-Alexandre Leroux,Patrick Mestré,Jean-Jacques Quisquater,

BLA 发表于 2025-3-29 13:24:01

Mark Looi,Paul Ashley,Loo Tang Seet,Richard Au,Gary Gaskell,Mark Vandenwauver

Limousine 发表于 2025-3-29 17:49:55

http://reply.papertrans.cn/87/8687/868623/868623_47.png

deviate 发表于 2025-3-29 20:52:48

http://reply.papertrans.cn/87/8687/868623/868623_48.png

蚀刻术 发表于 2025-3-30 01:18:27

http://reply.papertrans.cn/87/8687/868623/868623_49.png

座右铭 发表于 2025-3-30 06:54:23

byapplying dynamic feedback, but not by using static feedback.The bookis intended for researchers in mathematicalnonlinear systems theory. Geometric techniques play a keyrole in the book. Therefore, in Chapter 6 algebraictechniques are recalled and used.978-3-540-54543-9978-3-540-38461-8Series ISSN 0170-8643 Series E-ISSN 1610-7411
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Smart Card. Research and Applications; Third International Jean-Jacques Quisquater,Bruce Schneier Conference proceedings 2000 Springer-Ver