搜索结果: 1-5 共查到“军队指挥学 separable”相关记录5条 . 查询时间(0.058 秒)
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications
Key-reuse APIs Diffie-Hellman EdDSA
2019/5/21
Key separation is often difficult to enforce in practice. While key reuse can be catastrophic for security, we know of a number of cryptographic schemes for which it is provably safe. But existing for...
Separable Statistics and Multidimensional Linear Cryptanalysis
block ciphers multidimensional linear cryptanalysis separable statistics
2017/10/12
Multidimensional linear cryptanalysis of block ciphers is improved in this work by introducing a number of new ideas. Firstly, formulae is given to compute approximate multidimensional distributions o...
Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem
McEliece cryptosystem Goppa code separable irreducible
2015/12/21
The McEliece cryptosystem is an asymmetric type of cryptography based on
error correction code. The classical McEliece used irreducible binary Goppa code which
considered unbreakable until now espec...
Separable and Anonymous Identity-Based Key Issuing
Identity-based cryptography bilinear pairings GDH groups key issuing
2009/4/2
In identity-based (ID-based) cryptosystems, a local registration authority
(LRA) is responsible for authentication of users while the key generation
center (KGC) is responsible for computing and sen...
Separable Linkable Threshold Ring Signatures
Threshold Ring Signatures group signature scheme
2009/3/31
A ring signature scheme is a group signature scheme with
no group manager to setup a group or revoke a signer. A linkable ring
signature, introduced by Liu, et al. [20], additionally allows anyone t...