找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security and Cryptology; 8th International Co Mirosław Kutyłowski,Moti Yung Conference proceedings 2013 Springer-Verlag Berlin

[复制链接]
楼主: intrinsic
发表于 2025-3-26 21:55:08 | 显示全部楼层
发表于 2025-3-27 03:23:36 | 显示全部楼层
Visual Cryptography for Natural Images and Visual Voting,ges printed on transparencies will reveal the secret. The decryption is done directly by the human visual system without any extra calculations. Most of previous researches essentially handle only binary images, as the underling encoding matrices are all Boolean matrices. For gray-level image, we ne
发表于 2025-3-27 07:27:45 | 显示全部楼层
RCCA Security for KEM+DEM Style Hybrid Encryptions,ity to the most popular hybrid paradigms, KEM+DEM and Tag-KEM/DEM..It is open to construct an RCCA-secure scheme more efficient than CCA-secure ones. In the setting of Tag-KEM, we solve this by presenting a natural RCCA-secure RSA-based Tag-KEM scheme, named as RSA-TKEM, which is more efficient than
发表于 2025-3-27 10:39:59 | 显示全部楼层
Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations,ryptosystem as any polynomial equation: . which is satisfied by all such pairs. In this paper, we present a new attack on the multivariate public key cryptosystems from Diophantine equations developed by Gao and Heindl by using the embedded surfaces associated to this family of multivariate cryptosy
发表于 2025-3-27 16:22:30 | 显示全部楼层
Verifiable Structured Encryption,stead of keyword-based search only. Both structured encryption and SSE schemes mainly consider security against passive adversaries, until recently where SSE schemes secure against active adversaries were proposed. This means in addition of querying encrypted data, the adversaries can modify encrypt
发表于 2025-3-27 17:52:30 | 显示全部楼层
,Nested Merkle’s Puzzles against Sampling Attacks,ties the ability to securely and continuously communicate over an unprotected channel. To achieve the continuous security over unbounded communication sessions we propose to use a . Merkle’s puzzles approach where the honest parties repeatedly establish new keys and use previous keys to encrypt the
发表于 2025-3-27 22:15:36 | 显示全部楼层
发表于 2025-3-28 05:01:18 | 显示全部楼层
发表于 2025-3-28 10:07:36 | 显示全部楼层
发表于 2025-3-28 12:33:15 | 显示全部楼层
,The Security and Performance of “GCM” when Short Multiplications Are Used Instead, performs rather poorly in modern software implementation because of polynomial hashing in the large field GF(2.) (. denotes the block size of the underlying cipher). This paper investigates whether we can use polynomial hashing in the ring GF(2.) X GF(2.) instead. Such a change would normally compr
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-5 17:56
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表