军事学 >>> 军事学
搜索结果: 1-5 共查到军事学 secure public key encryption scheme相关记录5条 . 查询时间(0.203 秒)
LaMacchia, Lauter and Mityagin presented a strong security model for authenticated key agreement, namely the eCK model. They also constructed a protocol, namely the NAXOS protocol, that enjoys a simpl...
We show that a recently proposed construction by Rosen and Segev can be used for obtaining the first public key encryption scheme based on the McEliece assumptions which is secure against adaptive c...
A Forward-Secure Public-Key Encryption Scheme     Forward-Secure  Public-Key  Encryption Scheme       font style='font-size:12px;'> 2009/4/14
A Forward-Secure Public-Key Encryption Scheme
A Forward-Secure Public-Key Encryption Scheme     Bilinear Diffe-Hellman  Encryption  Binary-tree encryption       font style='font-size:12px;'> 2009/4/9
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious and realistic concern. In an e ort to mitigate the damage caused by exp...
A new paradigm of chosen ciphertext secure public key encryption scheme     PKE  KEM  IND-CCA2       font style='font-size:12px;'> 2008/8/21
For all current adaptive chosen ciphertext(CCA) secure public key encryption schemes in standard model there are two operations in the decryption algorithm, “validity check” and decryption.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...