搜索结果: 1-15 共查到“军队指挥学 LINE”相关记录22条 . 查询时间(0.148 秒)
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
E2EE LINE key exchange
2018/7/16
In this paper, we analyze the security of an end-to-end encryption scheme (E2EE) of LINE, a.k.a Letter Sealing. LINE is one of the most widely-deployed instant messaging applications, especially in Ea...
Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change
Digital money group blind signature double spending
2017/12/25
Several ecash systems have been proposed in the last twenty years or so,each offering features similar to real cash. One feature which to date has not been provided is that of a payee giving change to...
Recently a lot of attention is paid to the search for efficiently implementable MDS matrices for lightweight symmetric primitives. Previous work concentrated on locally optimizing the multiplication w...
Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks
3-line Feistel Meet-in-the-middle attack Key recovery
2017/11/13
In the paper, we study the security of 3-line generalized Feistel network, which is a considerate choice for some special needs, such as designing a 96-bit cipher based on a 32-bit round function. We ...
Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking”
anonymity unlikability cryptanalysis
2016/1/26
Recently, Fan et al. proposed a user efficient recoverable off-line e-cash scheme
with fast anonymity revoking. They claimed that their scheme could achieve security
requirements of an e-cash system...
Cryptanalysis on “Secure untraceable off-line electronic cash system”
digital signatures discrete logarithm problem cryptanalysis
2016/1/26
Recently, Baseri et al. proposed a secure untraceable off-line electronic cash
system. They claimed that their scheme could achieve security requirements of an
e-cash system such as, untraceability,...
Pipelineable On-Line Encryption
on-line cipher chosen-ciphertext security authenticated encryption
2016/1/23
Correct authenticated decryption requires the receiver to buffer the decrypted message until the authenticity check has been performed. In high-speed networks, which must handle large message frames...
Online/Off-line Ring Signature Scheme with Provable Security
unforgeability ring members signer anonymity
2016/1/6
The article proposes an Online/Off-line Ring Signature Scheme in random oracle
model.Security of the scheme relies on both Computational Diffie-Hellman and k-CAA
problems. The proposed scheme is pro...
An off-line electronic cash scheme is proposed that is suitable for
small payments. The approach is innovative, in that each coin may be
efficiently verified by the same or different merchants durin...
Faster Compact Diffie-Hellman: Endomorphisms on the x-line
Elliptic curve cryptography scalar multiplication
2014/3/6
We describe an implementation of fast elliptic curve scalar multiplication, optimized for Diffie–Hellman Key Exchange at the 128-bit security level. The algorithms are compact (using only x-coordinate...
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
secret-key cryptography authenticated encryption online encryption
2012/6/14
On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line and are provably ...
McOE:A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
secret-key cryptography / authenticated encryption online encryption provable security misuse resistant
2012/3/21
On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line and are provably ...
McOE:A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
secret-key cryptography / authenticated encryption online encryption provable security misuse resistant
2012/3/22
On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line and are provably ...
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces
implementation
2012/3/28
Protocols for generic secure multi-party computation (MPC) come in two forms: they either represent the function being computed as a boolean circuit, or as an arithmetic circuit over a large field. Ei...
In a perfect secret sharing scheme the dealer distributes shares to participants so that qualified subsets can recover the secret, while unqualified subsets have no information on the secret. In an on...