Impacted 发表于 2025-3-21 19:04:55

书目名称Topics in Cryptology -- CT-RSA 2003影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0926142<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2003影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0926142<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2003网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0926142<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2003网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0926142<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2003被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0926142<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2003被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0926142<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2003年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0926142<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2003年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0926142<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2003读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0926142<br><br>        <br><br>书目名称Topics in Cryptology -- CT-RSA 2003读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0926142<br><br>        <br><br>

CLASH 发表于 2025-3-21 23:26:33

Intrusion-Resilient Public-Key Encryptione notion of . [.] (which extends both the notions of . [.], [.] and . [.]) was proposed as a means of mitigating the harmful effects that key exposure can have. In this model, time is divided into distinct periods; the public key remains fixed throughout the lifetime of the protocol but the secret k

学术讨论会 发表于 2025-3-22 02:32:29

TMAC: Two-Key CBC MACrequires only (. + .)-bit keys while XCBC requires (. + 2.)-bit keys, where . is the key length of the underlying block cipher . and . is its block length. We achieve this by using a universal hash function and the cost is almost negligible. Similar to XCBC, the domain is 0, 1. and it requires no ex

ventilate 发表于 2025-3-22 07:24:10

Montgomery Prime Hashing for Message Authentication as the Montgomery residue of the message with respect to a secret modulus.T he modulus value is structured in a way that allows fast, compact implementations in both hardware and software.Th e set of allowed modulus values is large, and as a result, MPH achieves good, provable security..MPH perform

喃喃诉苦 发表于 2025-3-22 09:31:05

An Analysis of Proxy Signatures: Is a Secure Channel Necessary?er. In this paper, we discuss the necessity of a secure channel in proxy signatures. Though establishing a secure channel has much influence on the efficiency of the scheme, to the best of our knowledge, this topic has not been discussed before. All known proxy signatures used a secure channel to de

透明 发表于 2025-3-22 16:16:36

http://reply.papertrans.cn/93/9262/926142/926142_6.png

血友病 发表于 2025-3-22 20:42:48

http://reply.papertrans.cn/93/9262/926142/926142_7.png

unstable-angina 发表于 2025-3-22 23:53:25

Access Control Using Pairing Based Cryptography decryptor is defined by a logical formulae of conjunctions and disjunctions. This enables a simple mechanism to drive access control to broadcast encrypted data using user identities as the public keys.

Nebulizer 发表于 2025-3-23 03:22:02

http://reply.papertrans.cn/93/9262/926142/926142_9.png

相互影响 发表于 2025-3-23 06:57:02

About the XL Algorithm over ,(2)a finite field. At Asiacrypt 2002, Courtois and Pieprzyk show that the MQ problem is also relevant to the security of AES. At Eurocrypt 2000, Courtois, Klimov, Patarin and Shamir introduced the XL algorithm for solving MQ. They show that if the number of equations . is much larger than the number of
页: [1] 2 3 4
查看完整版本: Titlebook: Topics in Cryptology -- CT-RSA 2003; The Cryptographers‘ Marc Joye Conference proceedings 2003 Springer-Verlag Berlin Heidelberg 2003 RSA.