找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cryptography and Security: From Theory to Applications; Essays Dedicated to David Naccache Book 2012 Springer-Verlag GmbH Berlin Heidelber

[复制链接]
楼主: vitamin-D
发表于 2025-3-26 21:33:02 | 显示全部楼层
Traceable Signature with Stepping Capabilitiesed to enable authorities to delegate some of their detection capabilities to tracing sub-authorities. Instead of opening every single signatures and then threatening privacy, tracing sub-authorities are able to know if a signature was emitted by specific users only..In 2008, Libert and Yung proposed
发表于 2025-3-27 01:29:36 | 显示全部楼层
Deniable RSA Signatureto the cave but they need evidence to get justice from the Caliph. On the other hand, Ali Baba wants to be able to securely access to the cave without leaking any evidence. A similar scenario holds in the biometric passport application: Ali Baba wants to be able to prove his identity securely but do
发表于 2025-3-27 07:23:47 | 显示全部楼层
发表于 2025-3-27 10:36:13 | 显示全部楼层
Fully Forward-Secure Group Signaturessk analysis shows that taking advantage of system (., hardware, software, network) vulnerabilities is usually much easier than cryptanalyzing the cryptographic primitives themselves. For-ward-secure cryptosystems, in turn, are one of the suggested protective measures, where private keys periodically
发表于 2025-3-27 15:42:08 | 显示全部楼层
Public Key Encryption for the Forgetfulpublic key encryption with “backward recovery” contrasts more widely analyzed public key encryption with “forward secrecy”. We advocate that together they form the two sides of a whole coin, whereby offering complementary roles in data security, especially in cloud computing, 3G/4G communications an
发表于 2025-3-27 18:06:58 | 显示全部楼层
发表于 2025-3-28 01:12:51 | 显示全部楼层
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystemsch as public keys, that do not seem critical must be protected. From the attacks against RSA [5,4], we develop a new attack of DLP-based cryptosystems, built in addition on a lattice analysis [26] to recover DSA public keys from partially known nonces. Based on a realistic fault model, our attack on
发表于 2025-3-28 04:03:29 | 显示全部楼层
EM Probes Characterisation for Security Analysisf the Electro-Magnetic (EM) waves radiated from an integrated circuit are used to extract sensitive information. Several research papers have covered EMA but very few have focused on the probes used. In this paper we detail an approach for analysing different probes for EMA. We perform the character
发表于 2025-3-28 09:39:21 | 显示全部楼层
发表于 2025-3-28 11:51:08 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-23 15:26
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表