找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Topics in Cryptology -- CT-RSA 2014; The Cryptographer‘s Josh Benaloh Conference proceedings 2014 Springer International Publishing Switze

[复制链接]
楼主: irritants
发表于 2025-3-25 03:59:27 | 显示全部楼层
An Improved Compression Technique for Signatures Based on Learning with Errorstional assumptions. Our signatures are shorter than any previous proposal for provably-secure signatures based on standard lattice problems: at the 128-bit level we improve signature size from (more than) 16500 bits to around 9000 to 12000 bits.
发表于 2025-3-25 08:33:25 | 显示全部楼层
发表于 2025-3-25 15:41:39 | 显示全部楼层
0302-9743 cal sections on non-integral asymmetric functions, public-key encryption, hardware implementations, side-channel attacks, symmetric encryption and cryptanalysis, digital signatures, protocols, hash function cryptanalysis, and applications of cryptographic primitives.978-3-319-04851-2978-3-319-04852-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
发表于 2025-3-25 18:02:53 | 显示全部楼层
Practical Dual-Receiver Encryptions rely on random oracles or inefficient non-interactive zero-knowledge proofs. Finally, we investigate further applications or extensions of DRE, including DRE with CNM, combined use of DRE and PKE, strengthening two types of PKE schemes with plaintext equality test, off-the-record messaging with a stronger notion of deniability, etc.
发表于 2025-3-25 22:24:09 | 显示全部楼层
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulationmonstrate the latter construction to be vulnerable against manipulation of its public helper data. Full key recovery is possible, although depending on system design choices. We demonstrate our attacks using a 4-XOR arbiter PUF, manufactured in 65. CMOS technology. We also propose a simple but effective countermeasure.
发表于 2025-3-26 00:24:47 | 显示全部楼层
Decentralized Traceable Attribute-Based Signaturesmework permits expressive signing polices. Finally, we provide some instantiations of the primitive whose security reduces to falsifiable intractability assumptions without relying on idealized assumptions.
发表于 2025-3-26 07:13:21 | 显示全部楼层
0302-9743 CA, USA, in February 2014. The 25 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on non-integral asymmetric functions, public-key encryption, hardware implementations, side-channel attacks, symmetric encryption and cry
发表于 2025-3-26 09:59:50 | 显示全部楼层
发表于 2025-3-26 16:39:46 | 显示全部楼层
发表于 2025-3-26 19:28:33 | 显示全部楼层
A Generic View on Trace-and-Revoke Broadcast Encryption Schemes this yields a DCR-based revocation scheme..(b) We show that our EDDH-based revocation scheme allows for a mild form of traitor tracing (and, thus, yields a new trace-and-revoke scheme). In particular, compared to Wee’s factoring-based scheme, our DCR-based scheme has the advantage that it allows to trace traitors.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-2 00:54
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表