找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Topics in Cryptology -- CT-RSA 2014; The Cryptographer‘s Josh Benaloh Conference proceedings 2014 Springer International Publishing Switze

[復(fù)制鏈接]
樓主: irritants
21#
發(fā)表于 2025-3-25 03:59:27 | 只看該作者
An Improved Compression Technique for Signatures Based on Learning with Errorstional assumptions. Our signatures are shorter than any previous proposal for provably-secure signatures based on standard lattice problems: at the 128-bit level we improve signature size from (more than) 16500 bits to around 9000 to 12000 bits.
22#
發(fā)表于 2025-3-25 08:33:25 | 只看該作者
23#
發(fā)表于 2025-3-25 15:41:39 | 只看該作者
0302-9743 cal sections on non-integral asymmetric functions, public-key encryption, hardware implementations, side-channel attacks, symmetric encryption and cryptanalysis, digital signatures, protocols, hash function cryptanalysis, and applications of cryptographic primitives.978-3-319-04851-2978-3-319-04852-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
24#
發(fā)表于 2025-3-25 18:02:53 | 只看該作者
Practical Dual-Receiver Encryptions rely on random oracles or inefficient non-interactive zero-knowledge proofs. Finally, we investigate further applications or extensions of DRE, including DRE with CNM, combined use of DRE and PKE, strengthening two types of PKE schemes with plaintext equality test, off-the-record messaging with a stronger notion of deniability, etc.
25#
發(fā)表于 2025-3-25 22:24:09 | 只看該作者
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulationmonstrate the latter construction to be vulnerable against manipulation of its public helper data. Full key recovery is possible, although depending on system design choices. We demonstrate our attacks using a 4-XOR arbiter PUF, manufactured in 65. CMOS technology. We also propose a simple but effective countermeasure.
26#
發(fā)表于 2025-3-26 00:24:47 | 只看該作者
Decentralized Traceable Attribute-Based Signaturesmework permits expressive signing polices. Finally, we provide some instantiations of the primitive whose security reduces to falsifiable intractability assumptions without relying on idealized assumptions.
27#
發(fā)表于 2025-3-26 07:13:21 | 只看該作者
0302-9743 CA, USA, in February 2014. The 25 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on non-integral asymmetric functions, public-key encryption, hardware implementations, side-channel attacks, symmetric encryption and cry
28#
發(fā)表于 2025-3-26 09:59:50 | 只看該作者
29#
發(fā)表于 2025-3-26 16:39:46 | 只看該作者
30#
發(fā)表于 2025-3-26 19:28:33 | 只看該作者
A Generic View on Trace-and-Revoke Broadcast Encryption Schemes this yields a DCR-based revocation scheme..(b) We show that our EDDH-based revocation scheme allows for a mild form of traitor tracing (and, thus, yields a new trace-and-revoke scheme). In particular, compared to Wee’s factoring-based scheme, our DCR-based scheme has the advantage that it allows to trace traitors.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-6 01:54
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
忻城县| 红桥区| 禄丰县| 昌宁县| 岳阳市| 盐津县| 赤壁市| 黔西县| 鄯善县| 万山特区| 铜山县| 沂南县| 虎林市| 安吉县| 延安市| 蒙阴县| 华池县| 昌乐县| 张掖市| 横峰县| 新宾| 惠州市| 潞城市| 梓潼县| 邮箱| 靖西县| 望奎县| 雷山县| 延寿县| 德昌县| 昔阳县| 湖北省| 德江县| 扎兰屯市| 息烽县| 会东县| 蓬溪县| 蒲城县| 广宗县| 姜堰市| 绥棱县|