搜索结果: 1-4 共查到“知识库 军事学 repair”相关记录4条 . 查询时间(0.015 秒)
Deniable messaging protocols allow two parties to have `off-the-record' conversations without leaving any record that can convince external verifiers about what either of them said during the conversa...
On a weakness of the Tu-Deng function and its repair
Algebraic attack Boolean function Stream cipher
2009/12/29
We observe that the function introduced by Z. Tu and Y. Deng in the
ePrint Archive paper 2009/272 is weak against fast algebraic attacks. We
propose an alternative function sharing all the propertie...
How to Break and Repair a Universally Composable Signature Functionality
digital signature schemes universal composability adaptive chosenmessage attack
2009/4/10
Canetti and Rabin recently proposed a universally composable
ideal functionality FSIG for digital signatures. We show that
this functionality cannot be securely realized by any signature scheme,
th...
Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003
Trace Operator Polynomial Reconstruction Cryptosystem Eurocrypt
2009/4/10
In this paper, we present a modication of the Augot-Finiasz
cryptosystem presented at EUROCRYPT 2003. Coron managed to design
an attack against the original cryptosystem enabling an attacker
to de...