搜索结果: 1-5 共查到“军事学 residues”相关记录5条 . 查询时间(0.121 秒)
On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography
Jacobi symbol probability distribution statistical distance
2019/6/4
We develop exact formulas for the distribution of quadratic residues and non-residues in sets of the form a+X={(a+x)modn∣x∈X}a+X={(a+x)modn∣x∈X}, where nn is a prime or the product of two primes and X...
More Efficient Cryptosystems From $k^{th}$-Power Residues
additive homomorphism lossy trapdoor function
2014/3/10
At Eurocrypt 2013, Joye and Libert proposed a method for constructing public key cryptosystems (PKCs) and lossy trapdoor functions (LTDFs) from $(2^\alpha)^{th}$-power residue symbols. Their work can ...
Factoring an integer is equivalent to express the integer as the difference of two squares. We test
that for any odd modulus, in the corresponding ring of remainders, any element can be realized as t...
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown
cryptanalysis authentication password
2009/3/23
In 1988, Harn, Laih and Huang proposed a password authentication scheme based on
quadratic residues. However, in 1995, Chang, Wu and Laih pointed out that if the parameters
a ,b ,d and l are known b...
A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
mutual authentication RFID system binary search quadratic residues
2008/8/22
In 2004, Ari Juels [1] proposed a Yoking-Proofs protocol for RFID systems. The aim is to permit tags to generate a proof which is verifiable off-line by a trusted entity even when the readers are pote...