军事学 >>> 军事学
搜索结果: 1-6 共查到军事学 expander graphs相关记录6条 . 查询时间(0.067 秒)
Expander Graphs are Non-Malleable Codes     Non-malleable code  Split-state  Explicit Constructions       font style='font-size:12px;'> 2018/11/8
Any dd-regular graph on nn vertices with spectral expansion λλ satisfying n=Ω(d3log(d)/λ)n=Ω(d3log⁡(d)/λ) yields a O(λ3/2d)O(λ3/2d)-non-malleable code in the split-state model.
Fast Pseudorandom Functions Based on Expander Graphs     foundations  pseudo-random functions  Goldreich's OWF       font style='font-size:12px;'> 2016/12/10
Our proofs are based on a new search-to-decision reduction for expander-based functions. This extends a previous reduction of the first author (STOC 2012) which was applicable for the special case of ...
Threshold secret sharing is a protocol that allows a dealer to share a secret among nn players so that any coalition of tt players learns nothing about the secret, but any t+1t+1 players can reconstru...
We develop new schemes for deterministically updating a stored cryptographic key that provide security against an internal adversary who can control the update computation and leak bounded amounts of ...
Providing security for a wireless sensor network composed of small sensor nodes with limited battery power and memory can be a non-trivial task. A variety of key predistribution schemes have been prop...
Cryptographic hash functions from expander graphs      Cryptographic hash functions  expander graphs        font style='font-size:12px;'> 2008/10/22
We propose constructing provable collision resistant hash functions from expander graphs. As examples, we investigate two specific families of optimal expander graphs for provable hash function cons...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...