找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security Aspects in Information Technology; First International Marc Joye,Debdeep Mukhopadhyay,Michael Tunstall Conference proceedings 201

[复制链接]
楼主: obsess
发表于 2025-3-23 09:44:54 | 显示全部楼层
发表于 2025-3-23 15:34:20 | 显示全部楼层
发表于 2025-3-23 18:05:06 | 显示全部楼层
发表于 2025-3-24 00:22:46 | 显示全部楼层
发表于 2025-3-24 05:01:13 | 显示全部楼层
An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings. Proxy multi-signature is an extension of the basic proxy signature primitive, and permits two or more entities to delegate their signing capabilities to some other entity. Many identity-based proxy multi signature (IBPMS) schemes using bilinear pairings have been proposed. But the relative computa
发表于 2025-3-24 09:27:27 | 显示全部楼层
Distributed Signcryption Schemes with Formal Proof of Securityproposed [11,13]. But formal security models and security proofs have not been presented in any of these schemes..In this paper, we propose formal security model for distributed signcryption for confidentiality and unforgeability. We also modify schemes proposed by Mu & Varadharajan [18] and Gupta e
发表于 2025-3-24 11:22:26 | 显示全部楼层
Identity Based Online/Offline Encryption and Signcryption Schemes Revisitedation to the base station where the computational power is not limited. The most obvious way is to split each and every cryptographic operations into resource consuming, heavy operations and the fast light weight operations. This concept can be efficiently implemented through online/offline cryptogr
发表于 2025-3-24 15:21:01 | 显示全部楼层
“Rank Correction”: A New Side-Channel Approach for Secret Key RecoveryA on a cryptographic algorithm like the Data Encryption Standard (DES), the rank of the secret key displays a specific behaviour with regards to other hypotheses. Hence the Rank Corrector algorithm is devised, in order to improve existing SCAs by exploiting such behaviours. With a profiling phase on
发表于 2025-3-24 22:40:22 | 显示全部楼层
A Cache Trace Attack on CAMELLIAattacks. In this paper we present an attack on CAMELLIA, which utilizes cache access patterns along with the differential properties of CAMELLIA’s s-boxes. The attack, when implemented on a PowerPC microprocessor having a 32 byte cache line size requires power traces from 2. different encryptions. F
发表于 2025-3-25 01:18:54 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-29 09:45
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表