搜索结果: 1-3 共查到“军事学 Proof Method”相关记录3条 . 查询时间(0.062 秒)
New Integrated proof Method on Iterated Hash Structure and New Structures
Integrated proof Method Iterated Hash Structure New Structures
2008/11/18
A secure hash structure in Random Oracle Model may not
be a secure model in true design. In this paper, we give an integrated
proof method on security proof of iterated hash structure. Based on
the...
Key Exchange Protocols::Security Definition, Proof Method and Applications
Key Exchange Protocols Security Definition Proof Method Applications
2008/10/29
We develop a compositional method for proving cryptograph-
ically sound security properties of key exchange protocols, based on a
symbolic logic that is interpreted over conventional runs of a prot...
Inductive Proof Method for Computational Secrecy
Inductive Proof Method Computational Secrecy
2008/8/29
We investigate inductive methods for proving secrecy properties
of network protocols, in a “computational” setting applying
probabilistic polynomial-time adversary. As in cryptographic studies,
se...