irritants 发表于 2025-3-21 17:52:40

书目名称Topics in Cryptology -- CT-RSA 2014影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0926130<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2014影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0926130<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2014网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0926130<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2014网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0926130<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2014被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0926130<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2014被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0926130<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2014年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0926130<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2014年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0926130<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2014读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0926130<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2014读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0926130<br><br>        <br><br>

Digest 发表于 2025-3-21 20:44:37

http://reply.papertrans.cn/93/9262/926130/926130_2.png

整理 发表于 2025-3-22 01:58:45

A Generic View on Trace-and-Revoke Broadcast Encryption Schemesold extractable hash proof systems. In particular, he gave instances of his generic revocation scheme from the DDH assumption (which led to the Naor-Pinkas revocation scheme), and from the factoring assumption (which led to a new revocation scheme). We expand on Wee’s work in two directions:.(a) We

AVANT 发表于 2025-3-22 06:34:23

Broadcast Steganography with a dynamically designated set of receivers, so that the recipients recover the original content, while unauthorized users and outsiders remain . of the covert communication. One of our main technical contributions is the introduction of a new variant of anonymous broadcast encryption that we te

IRATE 发表于 2025-3-22 09:42:01

Practical Dual-Receiver Encryptionin one shot. We start by defining the crucial . property for DRE, which ensures that two recipients will get the same decryption result. While conceptually simple, DRE with soundness turns out to be a powerful primitive for various goals for PKE, such as complete non-malleability (CNM) and plaintext

insurrection 发表于 2025-3-22 16:33:56

Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulationly used to generate secret keys, hereby exploiting the unique manufacturing variations of an IC. Unfortunately, PUF output bits are not perfectly reproducible and non-uniformly distributed. To obtain a high-quality key, one needs to implement additional post-processing logic on the same IC. Fuzzy ex

放逐 发表于 2025-3-22 19:15:12

On Increasing the Throughput of Stream Ciphersing the throughput is to parallelize computations but this usually requires to insert additional memory cells for storing the intermediate results, hence at the expense of an increased hardware size..For stream ciphers with feedback shift registers (FSRs), we present an alternative approach for para

lipids 发表于 2025-3-22 21:19:46

http://reply.papertrans.cn/93/9262/926130/926130_8.png

审问,审讯 发表于 2025-3-23 02:27:32

On the Practical Security of a Leakage Resilient Masking Schemeack targets the manipulation of several, say ., intermediate variables then it is said to be a ..-order one. A privileged way to circumvent this type of attacks is to split any key-dependent variable into . shares, with . > ., and to adapt the internal processing in order to securely operate on thes

植物群 发表于 2025-3-23 07:19:18

http://reply.papertrans.cn/93/9262/926130/926130_10.png
页: [1] 2 3 4
查看完整版本: Titlebook: Topics in Cryptology -- CT-RSA 2014; The Cryptographer‘s Josh Benaloh Conference proceedings 2014 Springer International Publishing Switze