找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Cryptology — CRYPTO ’94; 14th Annual Internat Yvo G. Desmedt Conference proceedings 1994 Springer-Verlag Berlin Heidelberg 1994

[復制鏈接]
樓主: malcontented
11#
發(fā)表于 2025-3-23 10:32:05 | 只看該作者
,Law, Politics, and Sovereignty: 1919–1923, It is an identity-based signature scheme in which each signature can be used only once. We called such schemes “bounded life-span”. It is based on mental games and it uses zero-knowledge tools. A validation center is needed to initialize this identity-based scheme. A credential center is used to in
12#
發(fā)表于 2025-3-23 16:02:04 | 只看該作者
Carl Schmitt on Law and Liberalismefficient and flexible than the previously proposed methods, especially in the case where the amount of storage available is very small or quite large. It is also very efficient in computing .... for a small size . and variable number ., which occurs in the verification of Schnorr’s identification s
13#
發(fā)表于 2025-3-23 21:47:08 | 只看該作者
14#
發(fā)表于 2025-3-24 01:28:57 | 只看該作者
Carl Schmitt und die Liberalismuskritikbility of turbulence is well-understood mathematically; it reduces not to computational complexity, but to information losses. By timing disk accesses, a program can efficiently extract at least 100 independent, unbiased bits per minute, at no hardware cost. This paper has three parts: a mathematica
15#
發(fā)表于 2025-3-24 05:59:21 | 只看該作者
Carl Schmitt — Ein deutsches Schicksal. times. This multiround authentication makes it possible to limit the key size independently of the message length. We propose a new attack and show that the probability analysis made by Gemmell and Naor, which was only based on the minimum distance property of the codes, does not hold for our atta
16#
發(fā)表于 2025-3-24 07:22:52 | 只看該作者
17#
發(fā)表于 2025-3-24 11:49:50 | 只看該作者
18#
發(fā)表于 2025-3-24 14:59:51 | 只看該作者
https://doi.org/10.1057/9781137466594ward a general theory of multi-secret sharing schemes by using an information theoretical framework. We prove lower bounds on the size of information held by each participant for various access structures. Finally, we prove the optimality of the bounds by providing protocols.
19#
發(fā)表于 2025-3-24 20:54:34 | 只看該作者
https://doi.org/10.1057/9781137466594rs but only use simple operations (see [., .]). One was presented at the CRYPTO 89 rump session ([.]) and depends on the so-called Permuted Kernel problem (PKP). Another appeared in the CRYPTO 93 proceedings and is based on the syndrome decoding problem (SD) form the theory of error correcting codes
20#
發(fā)表于 2025-3-24 23:48:26 | 只看該作者
https://doi.org/10.1057/9781137466594have a secret sharing scheme . on . participants. Then under certain assumptions on . and ., we show how to transform . into a witness indistinguishable protocol, in which the prover demonstrates knowledge of the solution to some subset of . problem instances out of a collection of subsets defined b
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-13 06:50
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
新昌县| 石柱| 镇平县| 肃北| 松溪县| 都安| 海晏县| 临湘市| 义乌市| 凤庆县| 新宾| 义马市| 姚安县| 肇源县| 镇远县| 密云县| 夏河县| 扶沟县| 昌宁县| 唐海县| 濉溪县| 崇州市| 景泰县| 新泰市| 邵阳县| 江永县| 金川县| 九龙城区| 金山区| 邹城市| 兴宁市| 乌鲁木齐县| 浦县| 丹寨县| 班戈县| 晋州市| 乐亭县| 礼泉县| 三江| 丹江口市| 陕西省|