军事学 >>> 军事学 >>> 军队指挥学 >>> 作战指挥 军事系统工程 军事通信学 军事情报学 密码学 军队指挥学其他学科
搜索结果: 1-13 共查到军队指挥学 mixing相关记录13条 . 查询时间(0.218 秒)
ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA     Cryptocurrency  Cryptographic protocol  Privacy       font style='font-size:12px;'> 2019/5/28
Many cryptocurrencies, such as Bitcoin and Ethereum, do not provide any financial privacy to their users. These systems cannot be used as a medium of exchange as long as they are transparent. Therefor...
MixEth: efficient, trustless coin mixing service for Ethereum     Cryptography  Verifiable shuffle  Anonymity       font style='font-size:12px;'> 2019/4/3
Coin mixing is a prevalent privacy-enhancing technology for cryptocurrency users. In this paper, we present MixEth, which is a trustless coin mixing service for Turing-complete blockchains. MixEth doe...
There are two main ways of performing computation on private data: one method uses linear secret-sharing, in which additions require no communication and multiplications require two secrets to be broa...
Optimistic Mixing, Revisited     Mix-Nets  Re-Randomizable Replayable CCA  UC-security       font style='font-size:12px;'> 2018/11/14
Mixing Networks are protocols that allow a set of senders to send messages anonymously. Such protocols are fundamental building blocks to achieve privacy in a variety of applications, such as anonymou...
The public nature of the blockchain has been shown to be a severe threat for the privacy of Bitcoin users. Even worse, since funds can be tracked and tainted, no two coins are equal, and fungibility, ...
P2P Mixing and Unlinkable Bitcoin Transactions     anonymity  mixing  DC-nets  crypto-currencies       font style='font-size:12px;'> 2016/12/10
Starting with Dining Cryptographers networks (DC-net), several peer-to-peer (P2P) anonymous communication protocols have been proposed. Despite their strong anonymity guarantees none of those has been...
cMix: Anonymization byHigh-Performance Scalable Mixing     cMix  cryptographic protocols       font style='font-size:12px;'> 2016/1/27
cMix is a cryptographic protocol for mix networks that uses precomputations of a group-homomorphic encryption function to avoid all real-time public-key operations by the senders, mix nodes, and recei...
Characterization of EME with Linear Mixing     EME  PRP  OLPRP       font style='font-size:12px;'> 2016/1/26
Encrypt-Mix-Encrypt is a type of SPRP based construction, where a masked plaintext is encrypted in ECB mode of, then a non-linear mixing is performed and then again an encryption is performed in ECB...
The iterated Even-Mansour construction defines a block cipher from a tuple of public $n$-bit permutations $(P_1,\ldots,P_r)$ by alternatively xoring some $n$-bit round key $k_i$, $i=0,\ldots,r$, and a...
Key Mixing in Block Ciphers through Addition modulo $2^n$     Key Mixing  Block Ciphers  Addition modulo       font style='font-size:12px;'> 2009/3/12
Key Mixing in Block Ciphers through Addition modulo $2^n$.
The purpose of this note is to show that Markov chains induced by nonsingular triangular feedback shift registers and non-degenerate sources are rapidly mixing. The results may directly be applied t...
mv3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as rc4 into a 32- or 64-bit word version will obviously need vast amounts o...
Offline/Online Mixing     Offline/Online Mixing       font style='font-size:12px;'> 2008/9/3
Offline/Online Mixing.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...