军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 digital signatures相关记录16条 . 查询时间(0.078 秒)
Digital Signatures for Consensus     blockchain  multi-signature  forward-security       font style='font-size:12px;'> 2019/3/11
We present a pairing-based signature scheme for use in blockchains that achieves substantial savings in bandwidth and storage requirements while providing strong security guarantees. Our signature sch...
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose cryptographic parameters in a way that is supported by a security proof, without the need to sacrif...
On Composable Security for Digital Signatures     Digital Signatures  Composable Security       font style='font-size:12px;'> 2018/1/12
A digital signature scheme (DSS), which consists of a key-generation, a signing, and a verification algorithm, is an invaluable tool in cryptography. The first and still most widely used security defi...
This paper presents Dilithium, a lattice-based signature scheme that is part of the CRYSTALS (Cryptographic Suite for Algebraic Lattices) package that will be submitted to the NIST call for post-quant...
qDSA is a high-speed, high-security signature scheme that facilitates implementations with a very small memory footprint, a crucial requirement for embedded systems and IoT devices, and that uses the ...
Efficient Digital Signatures From Coding Theory     Signature  Coding Theory  Identification       font style='font-size:12px;'> 2017/5/11
The design of an efficient code-based signature scheme is by all means still an open problem. In this paper, we propose a simple and efficient scheme following the framework detailed by Lyubashevsky t...
Quantum Tokens for Digital Signatures     Quantum cryptography  digital signatures  token       font style='font-size:12px;'> 2017/2/20
The fisherman caught a quantum fish. "Fisherman, please let me go", begged the fish, "and I will grant you three wishes". The fisherman agreed. The fish gave the fisherman a quantum computer, three qu...
Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings     lattice  ideal lattice  Ring-SIS       font style='font-size:12px;'> 2016/12/10
In this work, we show that the above may actually be possible. We construct a digital signature scheme based (in the random oracle model) on a simple adaptation of the Ring-SIS problem which is as har...
Digital Signatures from Symmetric-Key Primitives     post-quantum cryptography  signatures  block cipher       font style='font-size:12px;'> 2016/12/7
We propose practically efficient signature schemes which feature several attractive properties: (a) they only rely on the security of symmetric-key primitives (block ciphers, hash functions), and are ...
Blank Digital Signatures     Digital signature scheme  blank digital signatures  elliptic curves  pairings  polynomial commitments       font style='font-size:12px;'> 2013/4/18
In this paper we present a novel type of digital signatures, which we call blank digital signatures. The basic idea behind this scheme is that an originator can define and sign a message template, des...
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent players in the protoc...
Provable Security of Digital Signatures in the Tamper-Proof Device Model.
Practical Attacks on Digital Signatures Using MD5 Message Digest     collision  hash function  MD5       font style='font-size:12px;'> 2009/4/3
We use the knowledge of the single MD5 collision published by Wang et al. [2] to show an example of a pair of binary self-extract packages with equal MD5 checksums, whereas resulting extracted contr...
We introduce the notion of tamper-evidence for digital signature generation in order to defend against attacks aimed at covertly leaking secret information held by corrupted network nodes. This is a...
The total computation of the generation and verification of personnel identification or digital signature is heavy. For many schemes of them, the total computation is not less than hundreds of modul...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...