搜索结果: 1-3 共查到“军事学 insecure”相关记录3条 . 查询时间(0.069 秒)
Semi-Honest Secure Multiparty Computation Can Be Insecure with Use of Even Almost Uniformly Random Number Generators
two-party computation randomness pseudorandom generator
2016/12/7
It is widely understood that we are just human beings rather than being almighty; as a result, when utilizing cryptographic technology in practice, we have always to rely on imperfect randomness to va...
Insecure“Provably Secure Network Coding”and Homomorphic Authentication Schemes for Network Coding
Provably Secure Network Coding Homomorphic Authentication Schemes Network Coding
2010/2/20
Network coding allows the routers to mix the received information before forwarding them
to the next nodes. Though this information mixing has been proven to maximize network
throughput, it also int...
Network coding allows the routers to mix the received information before forwarding them
to the next nodes. Though this information mixing has been proven to maximize network
throughput, it also int...