找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Cryptology - AUSCRYPT ‘92; Workshop on the Theo Jennifer Seberry,Yuliang Zheng Conference proceedings 1993 Springer-Verlag Berl

[復(fù)制鏈接]
樓主: 歸納
41#
發(fā)表于 2025-3-28 15:56:02 | 只看該作者
42#
發(fā)表于 2025-3-28 22:23:43 | 只看該作者
https://doi.org/10.1007/978-1-908517-90-6low) and the latter cannot be reused. All these limitations are solved in this paper by presenting a resuable conditionally secure authentication scheme with arbiter. The scheme is unconditionally secure against denial by the sender of having sent a message (which signatures do . have) and condition
43#
發(fā)表于 2025-3-29 00:57:49 | 只看該作者
Placental Function: Predicting Impairmentor the probability of success in each case and study the relationship of the two classes. We prove a new lower bound on the probability of deception which points out the importance of the average-distance between the encoding rules of the code in the protection provided by it. Codes with perfect pro
44#
發(fā)表于 2025-3-29 04:04:37 | 只看該作者
https://doi.org/10.1007/978-94-011-2638-0monotone access structure together with a security level is associated with a unique cumulative scheme. Geometric secret sharing schemes form a wide class of secret sharing schemes which have many desirable properties including good information rates. We show that every non-degenerate geometric secr
45#
發(fā)表于 2025-3-29 09:36:03 | 只看該作者
Caring for Mental Health in the Futureets ... In an NSS, it is possible that |..|<|.|, where |..| is the size of the share and |.| is the size of the secret. This paper characterizes nonperfect secret sharing schemes. First, we show that (.., .., ..) is realizable if and only if .. is monotone and .. ∪ .. is monotone. Then, we derive a
46#
發(fā)表于 2025-3-29 14:14:54 | 只看該作者
https://doi.org/10.1007/978-1-349-12879-2k codes. Already in the beginning of the eighties constructions of threshold schemes using linear block codes were presented in [6] and [7]. In this paper we generalize those results to construct secret sharing schemes for arbitrary access structure. We also present a solution to the problem of retr
47#
發(fā)表于 2025-3-29 18:58:59 | 只看該作者
The initial interview and health historyrepresents the fingerprint or digest of the message. A cryptographically useful property of a one-way hashing algorithm is that it is infeasible to find two distinct messages that have the same fingerprint. This paper proposes a one-way hashing algorithm called HAVAL. HAVAL compresses a message of a
48#
發(fā)表于 2025-3-29 21:43:30 | 只看該作者
Mary Carroll,L. Jane Brue,Brian Boothon based on “fingerprinting”. This paper proposes a new efficient class of hash functions based on a block cipher that allows for a tradeoff between security and speed. The principles behind the scheme can be used to optimize similar proposals.
49#
發(fā)表于 2025-3-30 01:14:22 | 只看該作者
50#
發(fā)表于 2025-3-30 04:38:40 | 只看該作者
https://doi.org/10.1007/978-1-349-12879-2 each individual member within the group, publishes a single group public key. During an initial “commitment phase”, at least . group members work together to sign a message. In a “verification phase”, all signers work together to prove the validity of the signature to an outsider. There is only a s
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-20 23:43
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
洪雅县| 龙海市| 澄城县| 岫岩| 微山县| 中山市| 宿州市| 大庆市| 游戏| 南投县| 菏泽市| 西盟| 张家港市| 松阳县| 沙坪坝区| 交城县| 甘肃省| 涟水县| 红安县| 湟源县| 盘锦市| 永泰县| 怀宁县| 穆棱市| 深泽县| 股票| 观塘区| 保定市| 临泽县| 阿尔山市| 阳春市| 兴安县| 广东省| 内乡县| 冷水江市| 五指山市| 泗水县| 中宁县| 长顺县| 普安县| 宾川县|