找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security and Privacy; 4th Australasian Con Josef Pieprzyk,Rei Safavi-Naini,Jennifer Seberry Conference proceedings 1999 Springe

[复制链接]
楼主: fumble
发表于 2025-3-25 07:19:59 | 显示全部楼层
发表于 2025-3-25 07:31:27 | 显示全部楼层
Conference Key Agreement from Secret Sharingn. To start a new conference all principals have to be active and broadcast their shares. If the conference goes ahead, all principals are sure that all principals are present and alive. The paper is concluded with a discussion about possible modifications and extensions of the protocol.
发表于 2025-3-25 13:35:29 | 显示全部楼层
On the Security of an RSA Based Encryption Scheme authentication capability. By means of probabilistic encoding, the scheme achieves semantic security and plaintext awareness in the standard (i.e. non random oracle) model under the assumption of a collision-resistant hash function and the factorization intractability of the receiver’s modulus.
发表于 2025-3-25 19:39:20 | 显示全部楼层
Generalised Cycling Attacks on RSA and Strong RSA Primesntroduce some new .. These attacks work . the knowledge of . and .. Therefore, these attacks can be used as factorisation algorithms. We also translate these attacks to elliptic curves. For this case we call these attacks .. Finally, we review criteria that a strong RSA prime must satisfy.
发表于 2025-3-25 23:34:40 | 显示全部楼层
Companion Viruses and the Macintosh: Threats and Countermeasuresntosh viruses. Following an examination of the details of our attack, we discuss generic countermeasures to a virus using the attack, one of which in particular appears very effective against the attack.
发表于 2025-3-26 04:02:34 | 显示全部楼层
Enumeration of Correlation Immune Boolean Functionsssary conditions and use these to derive better upper bounds. Further, bounds are obtained for the set of functions which satisfy the four conditions of correlation immunity, balancedness, nondegeneracy and nonaffinity. Our work clearly highlights the difficulty of exactly enumerating the set of correlation immune functions.
发表于 2025-3-26 04:51:00 | 显示全部楼层
发表于 2025-3-26 11:02:08 | 显示全部楼层
Inversion Attack and Branchingnction. Both theory and systematic experiments conducted show that its time complexity remains close to 2., . being the input memory size, while the additional memory space required is relatively small for most the filter functions.
发表于 2025-3-26 12:46:17 | 显示全部楼层
Fail-Stop Threshold Signature Schemes Based on Elliptic Curvesobtain a threshold signature scheme. The threshold signature scheme has a cheater detection property and allows the combiner to detect a sender who is submitting false shares. We will show that our fail-stop signature scheme works in the two commonly used models of signature schemes, with or without a trusted authority.
发表于 2025-3-26 16:49:37 | 显示全部楼层
On ,-Permutation Protection Scheme against Modification Attack. In this paper, we demonstrate how it can be done, and propose a revised .-permutation scheme that would close the loop-hole. It is also proved that the probability of breaking the revised scheme will be 1/2. for a .-bit key.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-18 19:30
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表