搜索结果: 1-6 共查到“知识库 军事学 part”相关记录6条 . 查询时间(0.046 秒)
Beyond Bitcoin -- Part II: Blockchain-based systems without mining
blockchain technology dependable distributed computing systems
font style='font-size:12px;'>
2016/12/12
Nowadays the decentralized transaction ledger functionality implemented through the blockchain technology is at the highest international interest because of the prospects both on opportunities and ri...
Garbled RAM Revisited, Part I
Secure Computation Oblivious RAM Garbled RAM
font style='font-size:12px;'>
2016/1/26
The notion of garbled random-access machines (garbled RAMs) was introduced by Lu and Ostrovsky
(Eurocrypt 2013). It can be seen as an analogue of Yao’s garbled circuits, that allows a user to garble
...
Garbled RAM Revisited, Part II
Secure Computation Oblivious RAM Garbled RAM
font style='font-size:12px;'>
2016/1/26
In EUROCRYPT 2013, Lu and Ostrovsky proposed the notion of Garbled RAM (GRAM) programs.
These GRAM programs are analogous to the classic result of Yao’s garbled circuits: a large encrypted
memory ca...
The Sum Can Be Weaker Than Each Part
Hash functions combiners XOR combiner
font style='font-size:12px;'>
2016/1/4
In this paper we study the security of summing the outputs of two independent hash functions, in an effort to increase the security of the resulting design, or to hedge against the failure of one of t...
Beyond Bitcoin - Part I: A critical look at blockchain-based systems
cryptocurrency blockchain mining
font style='font-size:12px;'>
2015/12/18
After more than six years from the launch of Bitcoin, it has become evident
that the decentralized transaction ledger functionality implemented
through the blockchain technology can be used not only...
Towards Security Two-part Authenticated Key Agreement Protocols
key management authenticated protocol ID-based Key Compromise Impersonation
font style='font-size:12px;'>
2009/3/2
We first present a new security 2-AK protocol, which is more secure and more efficient than previously proposed ones. Meanwhile, we point that Xie’s ID-2-AK protocol modified from McCullagh-Barreto i...