搜索结果: 16-20 共查到“军事学 Cryptographic protocols”相关记录20条 . 查询时间(0.125 秒)
On Modeling IND-CCA Security in Cryptographic Protocols
formal cryptography cryptographic protocols probabilistic encryption
2009/4/8
Two common notions of security for public key encryption
schemes are shown to be equivalent: we prove that indistinguishability
against chosen-ciphertext attacks (IND-CCA) is in fact polynomially
e...
Pairing-Based Cryptographic Protocols: A Survey
Pairing-Based Cryptographic Protocols Weil pairing
2009/3/24
The bilinear pairing such as Weil pairing or Tate pairing on elliptic and hyperelliptic curves
have recently been found applications in design of cryptographic protocols. In this survey, we
have tri...
Resource Fairness and Composability of Cryptographic Protocols
Resource Fairness Composability Cryptographic Protocols
2009/3/11
We introduce the notion of resource-fair protocols. Informally, this property states that if one
party learns the output of the protocol, then so can all other parties, as long as they expend
roughl...
Email’s main (and initial) use is professional and personal communication.
Email is very efficient, convenient and low-cost, especially when automatically
sent by programs to many recipients (‘bulk ...
We describe a method for enumerating all essentially different
executions possible for a cryptographic protocol. We call them the
shapes of the protocol. Naturally occurring protocols have only fini...