搜索结果: 1-3 共查到“军事学 modification”相关记录3条 . 查询时间(0.359 秒)
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
insider attacks chosen ciphertext attacks modification
font style='font-size:12px;'>
2018/4/25
At ACISP 2017, Wu et al. presented an identity-based encryption with equality test (IBEET) that considers to prevent insider attacks. To analyze its security, they proposed a new security notion for I...
Self-loop-based Modification of Smart and Vercauteren’s Fully Homomorphic Encryption
Fully Homomorphic Encryption Polynomial Coset Problem Sparse Subset Sum Problem
font style='font-size:12px;'>
2011/3/11
This paper modifies the Smart and Vercauteren’s fully homomorphic encryption scheme [SV10] by applying self-loop bootstrappable technique. The security of the modified scheme only depends on the hardn...
Message Modification for Step 21-23 on SHA-0
Message Modification Step 21-23 SHA-0
font style='font-size:12px;'>
2008/10/21
In CRYPTO 2005, Xiaoyun Wang, Hongbo Yu and Yiqun Lisa Yin proposed an efficient
collision attack on SHA-0. Collision messages are found with complexity 239 SHA-0 operations by using
their method. C...