找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security and Privacy; 20th Australasian Co Ernest Foo,Douglas Stebila Conference proceedings 2015 Springer International Publis

[復制鏈接]
樓主: 短暫
41#
發(fā)表于 2025-3-28 15:20:08 | 只看該作者
42#
發(fā)表于 2025-3-28 19:18:43 | 只看該作者
0302-9743 15, held in Brisbane, QLD, Australia, in June/July 2015..The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital
43#
發(fā)表于 2025-3-29 00:20:01 | 只看該作者
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemesird layers and CTR mode in the middle. The weak keys of polynomial evaluation hash in message authentication code and authenticated encryption have been thoroughly analyzed, but have never applied in TES. We point out that XCB, HCTR and HCH (and two variations of HCH: HCHp and HCHfp) can not resist
44#
發(fā)表于 2025-3-29 03:45:54 | 只看該作者
Cryptanalysis of Reduced-Round ,nalysis on .. Firstly, we focus on security properties at the hash function level by presenting (second) preimage, collision and distinguishing attacks on reduced-round .. In order to launch the preimage attack, we have to slightly tweak the original Meet-in-the-Middle preimage attack framework on .
45#
發(fā)表于 2025-3-29 11:12:09 | 只看該作者
Improving the Biclique Cryptanalysis of AES constructing bicliques with size . and reducing the number of S-boxes computed in the matching phase. Their results were improved later by better selections of differential characteristics in the biclique construction. In this paper, we improve the biclique attack by increasing the biclique size to
46#
發(fā)表于 2025-3-29 14:38:32 | 只看該作者
47#
發(fā)表于 2025-3-29 18:07:25 | 只看該作者
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptionsd allows the sender to dynamically choose the authorized set and the decryption threshold at the time of encryption. Currently, the only known dynamic TPKE scheme is a scheme proposed by Delerablée and Pointcheval (CRYPTO 2008). This scheme is proven to provide message confidentiality under a .-type
48#
發(fā)表于 2025-3-29 22:12:36 | 只看該作者
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Messagehash functions. In this paper, we show that by utilizing popular Sponge constructions in OAEP framework, we can eliminate the need of such hash functions. We provide a new scheme in OAEP framework based on Sponge construction and call our scheme . (SpAEP). SpAEP is based on 2 functions: Sponge and S
49#
發(fā)表于 2025-3-30 00:21:30 | 只看該作者
Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS In particular, recent improvements on horizontal power analysis?[., .] render ineffective the usual counter-measures which randomize the data at the very beginning of the computations?[., .]. To counteract horizontal analysis it is necessary to randomize the computations all along the exponentiatio
50#
發(fā)表于 2025-3-30 05:02:28 | 只看該作者
Towards Forward Security Properties for PEKS and IBEf the long-term secret keys is compromised in the future. In this paper, we investigate some forward security properties for Public-key Encryption with Keyword Search (PEKS) schemes, which allow a client to store encrypted data and delegate search operations to a server. The proposed properties guar
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-29 12:05
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
浦北县| 洞口县| 新闻| 白山市| 永春县| 富平县| 正定县| 孟连| 榆社县| 渝中区| 宜都市| 石家庄市| 大渡口区| 建瓯市| 西和县| 聂拉木县| 枣庄市| 广南县| 菏泽市| 花莲县| 张家港市| 格尔木市| 凉城县| 石屏县| 澳门| 镇赉县| 勐海县| 日土县| 碌曲县| 隆德县| 花莲市| 甘谷县| 那曲县| 乌苏市| 赤水市| 靖边县| 贡嘎县| 吴堡县| 庆城县| 仁布县| 阳谷县|