找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Cryptology - AUSCRYPT ‘92; Workshop on the Theo Jennifer Seberry,Yuliang Zheng Conference proceedings 1993 Springer-Verlag Berl

[復(fù)制鏈接]
樓主: 歸納
41#
發(fā)表于 2025-3-28 15:56:02 | 只看該作者
42#
發(fā)表于 2025-3-28 22:23:43 | 只看該作者
https://doi.org/10.1007/978-1-908517-90-6low) and the latter cannot be reused. All these limitations are solved in this paper by presenting a resuable conditionally secure authentication scheme with arbiter. The scheme is unconditionally secure against denial by the sender of having sent a message (which signatures do . have) and condition
43#
發(fā)表于 2025-3-29 00:57:49 | 只看該作者
Placental Function: Predicting Impairmentor the probability of success in each case and study the relationship of the two classes. We prove a new lower bound on the probability of deception which points out the importance of the average-distance between the encoding rules of the code in the protection provided by it. Codes with perfect pro
44#
發(fā)表于 2025-3-29 04:04:37 | 只看該作者
https://doi.org/10.1007/978-94-011-2638-0monotone access structure together with a security level is associated with a unique cumulative scheme. Geometric secret sharing schemes form a wide class of secret sharing schemes which have many desirable properties including good information rates. We show that every non-degenerate geometric secr
45#
發(fā)表于 2025-3-29 09:36:03 | 只看該作者
Caring for Mental Health in the Futureets ... In an NSS, it is possible that |..|<|.|, where |..| is the size of the share and |.| is the size of the secret. This paper characterizes nonperfect secret sharing schemes. First, we show that (.., .., ..) is realizable if and only if .. is monotone and .. ∪ .. is monotone. Then, we derive a
46#
發(fā)表于 2025-3-29 14:14:54 | 只看該作者
https://doi.org/10.1007/978-1-349-12879-2k codes. Already in the beginning of the eighties constructions of threshold schemes using linear block codes were presented in [6] and [7]. In this paper we generalize those results to construct secret sharing schemes for arbitrary access structure. We also present a solution to the problem of retr
47#
發(fā)表于 2025-3-29 18:58:59 | 只看該作者
The initial interview and health historyrepresents the fingerprint or digest of the message. A cryptographically useful property of a one-way hashing algorithm is that it is infeasible to find two distinct messages that have the same fingerprint. This paper proposes a one-way hashing algorithm called HAVAL. HAVAL compresses a message of a
48#
發(fā)表于 2025-3-29 21:43:30 | 只看該作者
Mary Carroll,L. Jane Brue,Brian Boothon based on “fingerprinting”. This paper proposes a new efficient class of hash functions based on a block cipher that allows for a tradeoff between security and speed. The principles behind the scheme can be used to optimize similar proposals.
49#
發(fā)表于 2025-3-30 01:14:22 | 只看該作者
50#
發(fā)表于 2025-3-30 04:38:40 | 只看該作者
https://doi.org/10.1007/978-1-349-12879-2 each individual member within the group, publishes a single group public key. During an initial “commitment phase”, at least . group members work together to sign a message. In a “verification phase”, all signers work together to prove the validity of the signature to an outsider. There is only a s
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-21 03:09
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
酒泉市| 茶陵县| 九龙坡区| 九江县| 凌源市| 海门市| 霍州市| 宕昌县| 色达县| 从化市| 南平市| 兴海县| 黄石市| 满城县| 城步| 荣成市| 托克逊县| 双牌县| 阿瓦提县| 龙海市| 梓潼县| 临城县| 华容县| 木里| 星子县| 安阳县| 岚皋县| 内江市| 延吉市| 秀山| 湟源县| 遂昌县| 若羌县| 桐乡市| 永胜县| 汤阴县| 萝北县| 新安县| 察雅县| 大埔县| 宣城市|