找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Cryptology - AUSCRYPT ‘92; Workshop on the Theo Jennifer Seberry,Yuliang Zheng Conference proceedings 1993 Springer-Verlag Berl

[復(fù)制鏈接]
樓主: 歸納
41#
發(fā)表于 2025-3-28 15:56:02 | 只看該作者
42#
發(fā)表于 2025-3-28 22:23:43 | 只看該作者
https://doi.org/10.1007/978-1-908517-90-6low) and the latter cannot be reused. All these limitations are solved in this paper by presenting a resuable conditionally secure authentication scheme with arbiter. The scheme is unconditionally secure against denial by the sender of having sent a message (which signatures do . have) and condition
43#
發(fā)表于 2025-3-29 00:57:49 | 只看該作者
Placental Function: Predicting Impairmentor the probability of success in each case and study the relationship of the two classes. We prove a new lower bound on the probability of deception which points out the importance of the average-distance between the encoding rules of the code in the protection provided by it. Codes with perfect pro
44#
發(fā)表于 2025-3-29 04:04:37 | 只看該作者
https://doi.org/10.1007/978-94-011-2638-0monotone access structure together with a security level is associated with a unique cumulative scheme. Geometric secret sharing schemes form a wide class of secret sharing schemes which have many desirable properties including good information rates. We show that every non-degenerate geometric secr
45#
發(fā)表于 2025-3-29 09:36:03 | 只看該作者
Caring for Mental Health in the Futureets ... In an NSS, it is possible that |..|<|.|, where |..| is the size of the share and |.| is the size of the secret. This paper characterizes nonperfect secret sharing schemes. First, we show that (.., .., ..) is realizable if and only if .. is monotone and .. ∪ .. is monotone. Then, we derive a
46#
發(fā)表于 2025-3-29 14:14:54 | 只看該作者
https://doi.org/10.1007/978-1-349-12879-2k codes. Already in the beginning of the eighties constructions of threshold schemes using linear block codes were presented in [6] and [7]. In this paper we generalize those results to construct secret sharing schemes for arbitrary access structure. We also present a solution to the problem of retr
47#
發(fā)表于 2025-3-29 18:58:59 | 只看該作者
The initial interview and health historyrepresents the fingerprint or digest of the message. A cryptographically useful property of a one-way hashing algorithm is that it is infeasible to find two distinct messages that have the same fingerprint. This paper proposes a one-way hashing algorithm called HAVAL. HAVAL compresses a message of a
48#
發(fā)表于 2025-3-29 21:43:30 | 只看該作者
Mary Carroll,L. Jane Brue,Brian Boothon based on “fingerprinting”. This paper proposes a new efficient class of hash functions based on a block cipher that allows for a tradeoff between security and speed. The principles behind the scheme can be used to optimize similar proposals.
49#
發(fā)表于 2025-3-30 01:14:22 | 只看該作者
50#
發(fā)表于 2025-3-30 04:38:40 | 只看該作者
https://doi.org/10.1007/978-1-349-12879-2 each individual member within the group, publishes a single group public key. During an initial “commitment phase”, at least . group members work together to sign a message. In a “verification phase”, all signers work together to prove the validity of the signature to an outsider. There is only a s
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-21 03:09
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
安顺市| 喀什市| 集贤县| 丹凤县| 承德县| 长武县| 元谋县| 巴林右旗| 孟州市| 余干县| 博白县| 海兴县| 调兵山市| 扶绥县| 阿克陶县| 泰宁县| 邵阳县| 个旧市| 海原县| 内丘县| 阳高县| 满洲里市| 泸州市| 柘城县| 合作市| 西吉县| 习水县| 怀柔区| SHOW| 伊通| 时尚| 温宿县| 松滋市| 南昌市| 调兵山市| 双鸭山市| 井冈山市| 南通市| 辽源市| 滦南县| 延津县|