搜索结果: 1-15 共查到“军队指挥学 LINE”相关记录22条 . 查询时间(0.109 秒)
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
E2EE LINE key exchange
font style='font-size:12px;'>
2018/7/16
In this paper, we analyze the security of an end-to-end encryption scheme (E2EE) of LINE, a.k.a Letter Sealing. LINE is one of the most widely-deployed instant messaging applications, especially in Ea...
Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change
Digital money group blind signature double spending
font style='font-size:12px;'>
2017/12/25
Several ecash systems have been proposed in the last twenty years or so,each offering features similar to real cash. One feature which to date has not been provided is that of a payee giving change to...
Shorter Linear Straight-Line Programs for MDS Matrices
XOR Count MDS Linear Layer
font style='font-size:12px;'>
2017/11/28
Recently a lot of attention is paid to the search for efficiently implementable MDS matrices for lightweight symmetric primitives. Previous work concentrated on locally optimizing the multiplication w...
Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks
3-line Feistel Meet-in-the-middle attack Key recovery
font style='font-size:12px;'>
2017/11/13
In the paper, we study the security of 3-line generalized Feistel network, which is a considerate choice for some special needs, such as designing a 96-bit cipher based on a 32-bit round function. We ...
Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking”
anonymity unlikability cryptanalysis
font style='font-size:12px;'>
2016/1/26
Recently, Fan et al. proposed a user efficient recoverable off-line e-cash scheme
with fast anonymity revoking. They claimed that their scheme could achieve security
requirements of an e-cash system...
Cryptanalysis on “Secure untraceable off-line electronic cash system”
digital signatures discrete logarithm problem cryptanalysis
font style='font-size:12px;'>
2016/1/26
Recently, Baseri et al. proposed a secure untraceable off-line electronic cash
system. They claimed that their scheme could achieve security requirements of an
e-cash system such as, untraceability,...
Pipelineable On-Line Encryption
on-line cipher chosen-ciphertext security authenticated encryption
font style='font-size:12px;'>
2016/1/23
Correct authenticated decryption requires the receiver to buffer the decrypted message until the authenticity check has been performed. In high-speed networks, which must handle large message frames...
Online/Off-line Ring Signature Scheme with Provable Security
unforgeability ring members signer anonymity
font style='font-size:12px;'>
2016/1/6
The article proposes an Online/Off-line Ring Signature Scheme in random oracle
model.Security of the scheme relies on both Computational Diffie-Hellman and k-CAA
problems. The proposed scheme is pro...
Microcash: Efficient Off-Line Small Payments
cryptographic protocols Cryptocurrency
font style='font-size:12px;'>
2015/12/29
An off-line electronic cash scheme is proposed that is suitable for
small payments. The approach is innovative, in that each coin may be
efficiently verified by the same or different merchants durin...
Faster Compact Diffie-Hellman: Endomorphisms on the x-line
Elliptic curve cryptography scalar multiplication
font style='font-size:12px;'>
2014/3/6
We describe an implementation of fast elliptic curve scalar multiplication, optimized for Diffie–Hellman Key Exchange at the 128-bit security level. The algorithms are compact (using only x-coordinate...
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
secret-key cryptography authenticated encryption online encryption
font style='font-size:12px;'>
2012/6/14
On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line and are provably ...
McOE:A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
secret-key cryptography / authenticated encryption online encryption provable security misuse resistant
font style='font-size:12px;'>
2012/3/21
On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line and are provably ...
McOE:A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
secret-key cryptography / authenticated encryption online encryption provable security misuse resistant
font style='font-size:12px;'>
2012/3/22
On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line and are provably ...
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces
implementation
font style='font-size:12px;'>
2012/3/28
Protocols for generic secure multi-party computation (MPC) come in two forms: they either represent the function being computed as a boolean circuit, or as an arithmetic circuit over a large field. Ei...
On-line secret sharing
foundations / secret sharing online algorithm complexity entropy
font style='font-size:12px;'>
2012/3/29
In a perfect secret sharing scheme the dealer distributes shares to participants so that qualified subsets can recover the secret, while unqualified subsets have no information on the secret. In an on...