搜索结果: 1-6 共查到“军事学 interpretation”相关记录6条 . 查询时间(0.327 秒)
A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem
Intersection of Curves Grobner Basis Vanishing Ideals
2019/9/19
In this paper, we intend to study the geometric meaning of the discrete logarithm problem defined over an Elliptic Curve. The key idea is to reduce the Elliptic Curve Discrete Logarithm Problem (EC-DL...
Controlled-NOT function can provoke biased interpretation from Bell's test experiments
cryptografic protocol cnot gate Bell test
2017/7/19
Recently, we showed that the controlled-NOT function is a permutation that cannot be inverted in subexponential time in the worst case [Quantum Information Processing. 16:149 (2017)]. Here, we show th...
Provable Security Proofs and their Interpretation in the Real World
Provable Security EDL Signature Scheme
2014/3/5
This paper analyses provable security proofs, using the EDL signature scheme as its case study, and interprets their benefits and drawbacks when applied to the real world.
Provable security has been...
An Automata-Theoretic Interpretation of Iterated Hash Functions - Application to Multicollisions
Automata-Theoretic Interpretation Iterated Hash Functions Multicollisions
2009/9/27
In this paper we present a new method of constructing multi-
collision sets for iterated hash functions. Multicollisions have been stud-
ied quite actively since Joux published an attack against ite...
An Automata-Theoretic Interpretation of Iterated Hash Functions - Application to Multicollisions
Automata-Theoretic Interpretation Iterated Hash Functions Multicollision
2009/9/22
In this paper we present a new method of constructing multi-
collision sets for iterated hash functions. Multicollisions have been stud-
ied quite actively since Joux published an attack against ite...
Sound Computational Interpretation of Formal Hashes
Sound Computational Interpretation Formal Hashes
2008/10/21
This paper provides one more step towards bridging the gap between
the formal and computational approaches to cryptographic protocols. We
extend the well-known Abadi-Rogaway logic with probabilistic...