军事学 >>> 军事学
搜索结果: 1-9 共查到军事学 cryptographic schemes相关记录9条 . 查询时间(0.062 秒)
This paper proposes a simple single bit flip fault attack applicable to several LWE (Learning With Errors Problem) based lattice based schemes like KYBER, NEWHOPE, DILITHIUM and FRODO which were submi...
Efficient Constructions for tt-(k,n)∗-Random Grid Visual Cryptographic Schemes     OR  XOR       font style='font-size:12px;'> 2017/8/17
In this paper we consider both ``OR" and ``XOR" based monochrome random grid visual cryptographic schemes (RGVCS) for tt-(k,n)∗(k,n)∗ access structure which is a generalization of the thre...
The SM9 Cryptographic Schemes     cryptographic protocols  identity-based cryptosystem       font style='font-size:12px;'> 2017/2/16
SM9 is a Chinese official cryptography standard which defines a set of identity-based cryptographic schemes from pairings. This report describes the technical specification of SM9 as a reference for t...
In this paper we pick up an old challenge to design public key or white-box constructions from symmetric cipher components. We design several encryption schemes based on the ASASA structure ranging ...
Post-quantum cryptographic schemes have been developed in the last decade in response to the rise of quantum computers. Fortunately, several schemes have been developed with quantum resistance. How...
Cryptographic schemes, key exchange, public key.     general cryptography  key exchange       font style='font-size:12px;'> 2014/3/13
General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. ...
Remarks on Some Quantum Cryptographic Schemes     quantum key establishment  quantum secret sharing  BB84 scheme       font style='font-size:12px;'> 2009/11/18
We remark that the schemes [PhysRevLett.98.020503, PhysRevA.74.012315, PhysRevA.71.022321, PhysRevA.72.012304, PhysRevA.69.052307, PhysRevA.59.1829] are not secret sharing schemes as claimed.
We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all useperturbation polyn...
The main result of this paper is that the Dolev-Yao model is a safe abstraction of the computational model for security protocols including those that combine asymmetric and symmetric encryption, sign...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...