找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Topics in Cryptology -- CT-RSA 2011; The Cryptographers‘ Aggelos Kiayias Conference proceedings 2011 Springer Berlin Heidelberg 2011 authe

[复制链接]
楼主: 女孩
发表于 2025-3-23 12:11:40 | 显示全部楼层
Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keyszyk (eCK) model proposed by LaMacchia, Lauter and Mityagin. To the best of our knowledge, this is the first approach for providing secure protocols based on the condition. With this condition, we propose a construction of two-pass AKE protocols, and the resulting two-pass AKE protocols are construct
发表于 2025-3-23 14:31:47 | 显示全部楼层
发表于 2025-3-23 21:15:31 | 显示全部楼层
Ideal Key Derivation and Encryption in Simulation-Based Securityh protocols in a composable way, in this paper we extend an ideal functionality for symmetric and public-key encryption proposed in previous work by a mechanism for key derivation. We also equip this functionality with message authentication codes (MACs), digital signatures, and ideal nonce generati
发表于 2025-3-23 23:22:02 | 显示全部楼层
Beyond Provable Security Verifiable IND-CCA Security of OAEPn years after the introduction of ., we present a machine-checked proof of its security against adaptive chosen-ciphertext attacks under the assumption that the underlying permutation is partial-domain one-way. The proof can be independently verified by running a small and trustworthy proof checker
发表于 2025-3-24 03:15:42 | 显示全部楼层
MJH: A Faster Alternative to MDC-2functions, dubbed MJH, are provably collision resistant up to . queries in the iteration..When based on .-bit key blockciphers, our construction provides better provable security than MDC-2, the only known construction of a rate-1/2 double-length hash function based on an .-bit key blockcipher with
发表于 2025-3-24 07:08:47 | 显示全部楼层
Online Ciphers from Tweakable BlockciphersDefinitions, constructions, and applications for these objects were first given by Bellare, Boldyreva, Knudsen, and Namprempre. We simplify and generalize their work, showing that online ciphers are rather trivially constructed from tweakable blockciphers, a notion of Liskov, Rivest, and Wagner. We
发表于 2025-3-24 11:16:00 | 显示全部楼层
发表于 2025-3-24 17:07:45 | 显示全部楼层
发表于 2025-3-24 19:34:42 | 显示全部楼层
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocolse being granted access to a resource. However, recent client puzzle difficulty definitions (Stebila and Ustaoglu, 2009; Chen et al., 2009) do not ensure that solving . puzzles is . times harder than solving one puzzle. Motivated by examples of puzzles where this is the case, we present stronger defi
发表于 2025-3-25 00:54:10 | 显示全部楼层
Conference proceedings 2011n February 2011. .The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement,
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-10 14:49
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表