找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security and Cryptography for Networks; 6th International Co Rafail Ostrovsky,Roberto Prisco,Ivan Visconti Conference proceedings 2008 The

[复制链接]
楼主: GALL
发表于 2025-3-26 23:30:02 | 显示全部楼层
General Certificateless Encryption and Timed-Release EncryptionLE and TRE differ and there is no generic transformation from a CLE to a TRE. This paper gives a generalized model for CLE that fulfills the requirements of TRE. This model is secure against adversaries with adaptive trapdoor extraction capabilities, decryption capabilities for arbitrary public keys
发表于 2025-3-27 02:28:01 | 显示全部楼层
Efficient Certificate-Based Encryption in the Standard ModelCA) security directly without any transformation. When compared to all previous generic constructions (in either random oracle or standard model), our scheme is far more efficient than those schemes. When compared to the CBE scheme in [16] (which is the only concrete implementation secure in the sta
发表于 2025-3-27 07:57:00 | 显示全部楼层
An Improved Robust Fuzzy Extractor in the presence of an active adversary. Robust fuzzy extractors were defined by Dodis et al. in Crypto 2006 to be noninteractive, i.e., only one message ., which can be modified by an unbounded adversary, can pass from one party to the other. This allows them to be used by a single party at differe
发表于 2025-3-27 10:13:03 | 显示全部楼层
On Linear Secret Sharing for Connectivity in Directed Graphsted graph, and a set of parties (i.e., edges) can reconstruct the secret if it contains a path from node . to node .. We prove that in every linear secret sharing scheme realizing the st-con function on a directed graph with . edges the total size of the shares is .(..). This should be contrasted wi
发表于 2025-3-27 14:23:18 | 显示全部楼层
发表于 2025-3-27 20:57:21 | 显示全部楼层
Anonymous Proxy Signaturesiate delegators remain anonymous. As for group signatures, in case of misuse, a special authority can . signatures to reveal the chain of delegations and the signer’s identity. The scheme satisfies a strong notion of non-frameability generalizing the one for dynamic group signatures. We give formal
发表于 2025-3-28 00:08:13 | 显示全部楼层
发表于 2025-3-28 05:55:39 | 显示全部楼层
Using Normal Bases for Compact Hardware Implementations of the AES S-Boxn affine transformation in GF(2). The S-box is the most expansive building block of any hardware implementation of the AES, and the multiplicative inversion is the most costly step of the S-box transformation. There exist many publications about hardware implementations of the S-box and the smallest
发表于 2025-3-28 08:26:22 | 显示全部楼层
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes, is still unbroken up to now, but has two major drawbacks: long key and low transmission rate. Our variant is based on QC-LDPC codes and is able to overcome such drawbacks, while avoiding the known attacks. Recently, however, a new attack has been discovered that can recover the private key with li
发表于 2025-3-28 13:14:56 | 显示全部楼层
Full Cryptanalysis of LPS and Morgenstern Hash Functions computing preimages was also easy for this hash function. We present a probabilistic polynomial time algorithm solving this problem. Subsequently, we study the Morgenstern hash, an interesting variant of LPS hash, and break this function as well. Our attacks build upon the ideas of Zémor and Tillic
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-10 19:07
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表