GRACE 发表于 2025-3-23 11:02:00
Efficient , ,) Arithmetic Architectures for Cryptographic Applicationss architectures, where . is odd. We present designs which trade area for performance based on the number of coefficients that the multiplier processes at one time. Families of irreducible polynomials are introduced to reduce the complexity of the modulo reduction operation and, thus, improved the efHUMID 发表于 2025-3-23 16:26:25
Hardware Performance Characterization of Block Cipher Structuresm Distance Separable (MDS) mappings. In particular, we examine nested Substitution-Permutation Networks (SPNs) and Feistel networks with round functions composed of S-boxes and MDS mappings. Within each cipher structure, many cases are considered based on two types of S-boxes (i.e., 4X4 and 8X8) and荒唐 发表于 2025-3-23 19:29:44
Simple Identity-Based Cryptography with Mediated RSA arbitrary identification value, such as name or email address.Th e main practical benefit of identity-based cryptography is in greatly reducing the need for, and reliance on, public key certificates. Although some interesting identity-based techniques have been developed in the past, none are compa明确 发表于 2025-3-23 23:21:56
http://reply.papertrans.cn/93/9262/926142/926142_14.png陪审团 发表于 2025-3-24 06:14:45
http://reply.papertrans.cn/93/9262/926142/926142_15.pngConspiracy 发表于 2025-3-24 09:59:03
http://reply.papertrans.cn/93/9262/926142/926142_16.png财主 发表于 2025-3-24 13:24:32
Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixesblic-key encrypted to multiple intermediates (mixes), each of which forwards the message after removing one layer of encryption. To conceal as much information as possible when using variable (source routed) chains, all messages passed to mixes should be of the same length; thus, message length shou遗弃 发表于 2025-3-24 17:11:11
http://reply.papertrans.cn/93/9262/926142/926142_18.png独白 发表于 2025-3-24 22:28:22
Shared Generation of Pseudo-Random Functions with Cumulative Mapse inputs ., any . players can compute . while . or fewer players fail to do so, where 0 ≤ . < . ≤ .. The idea behind the Micali-Sidney scheme is to generate and distribute secret seeds . = .1, . . . , . of a poly-random collection of functions, among the . players, each player gets a subset of ., inCrohns-disease 发表于 2025-3-25 00:39:08
Forward-Security in Private-Key Cryptographyng how forward-secure message authentication schemes and symmetric encryption schemes can be built based on standard schemes for these problems coupled with forwardsecure pseudorandom bit generators. We then apply forward-secure message authentication schemes to the problem of maintaining secure access logs in the presence of break-ins.