搜索结果: 1-4 共查到“军队指挥学 cryptographic systems”相关记录4条 . 查询时间(0.125 秒)
A Lattice-Based Universal Thresholdizer for Cryptographic Systems
threshold cryptography threshold signatures lattices
2017/3/21
We develop a general approach to thresholdizing a large class of (non-threshold) cryptographic schemes. We show how to add threshold functionality to CCA-secure public-key encryption (PKE), signature ...
Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size ...
Surreptitiously Weakening Cryptographic Systems
Sabotage cryptographic weaknesses backdoors
2016/1/4
Revelations over the past couple of years highlight the importance of understanding malicious and
surreptitious weakening of cryptographic systems. We provide an overview of this domain, using a numb...
On Fairness in Simulatability-based Cryptographic Systems
fairness simulatability cryptographic protocols
2009/3/2
Simulatability constitutes the cryptographic notion of a secure refinement and
has asserted its position as one of the fundamental concepts of modern cryptography.
Although simulatability carefully ...