找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Advances in Cryptology - AUSCRYPT ‘92; Workshop on the Theo Jennifer Seberry,Yuliang Zheng Conference proceedings 1993 Springer-Verlag Berl

[复制链接]
楼主: 归纳
发表于 2025-3-28 15:56:02 | 显示全部楼层
发表于 2025-3-28 22:23:43 | 显示全部楼层
https://doi.org/10.1007/978-1-908517-90-6low) and the latter cannot be reused. All these limitations are solved in this paper by presenting a resuable conditionally secure authentication scheme with arbiter. The scheme is unconditionally secure against denial by the sender of having sent a message (which signatures do . have) and condition
发表于 2025-3-29 00:57:49 | 显示全部楼层
Placental Function: Predicting Impairmentor the probability of success in each case and study the relationship of the two classes. We prove a new lower bound on the probability of deception which points out the importance of the average-distance between the encoding rules of the code in the protection provided by it. Codes with perfect pro
发表于 2025-3-29 04:04:37 | 显示全部楼层
https://doi.org/10.1007/978-94-011-2638-0monotone access structure together with a security level is associated with a unique cumulative scheme. Geometric secret sharing schemes form a wide class of secret sharing schemes which have many desirable properties including good information rates. We show that every non-degenerate geometric secr
发表于 2025-3-29 09:36:03 | 显示全部楼层
Caring for Mental Health in the Futureets ... In an NSS, it is possible that ¦..¦<¦.¦, where ¦..¦ is the size of the share and ¦.¦ is the size of the secret. This paper characterizes nonperfect secret sharing schemes. First, we show that (.., .., ..) is realizable if and only if .. is monotone and .. ∪ .. is monotone. Then, we derive a
发表于 2025-3-29 14:14:54 | 显示全部楼层
https://doi.org/10.1007/978-1-349-12879-2k codes. Already in the beginning of the eighties constructions of threshold schemes using linear block codes were presented in [6] and [7]. In this paper we generalize those results to construct secret sharing schemes for arbitrary access structure. We also present a solution to the problem of retr
发表于 2025-3-29 18:58:59 | 显示全部楼层
The initial interview and health historyrepresents the fingerprint or digest of the message. A cryptographically useful property of a one-way hashing algorithm is that it is infeasible to find two distinct messages that have the same fingerprint. This paper proposes a one-way hashing algorithm called HAVAL. HAVAL compresses a message of a
发表于 2025-3-29 21:43:30 | 显示全部楼层
Mary Carroll,L. Jane Brue,Brian Boothon based on “fingerprinting”. This paper proposes a new efficient class of hash functions based on a block cipher that allows for a tradeoff between security and speed. The principles behind the scheme can be used to optimize similar proposals.
发表于 2025-3-30 01:14:22 | 显示全部楼层
发表于 2025-3-30 04:38:40 | 显示全部楼层
https://doi.org/10.1007/978-1-349-12879-2 each individual member within the group, publishes a single group public key. During an initial “commitment phase”, at least . group members work together to sign a message. In a “verification phase”, all signers work together to prove the validity of the signature to an outsider. There is only a s
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-16 06:00
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表