军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 Remarks相关记录15条 . 查询时间(0.109 秒)
Quantum entanglement is of great importance to quantum cryptography and computation. So far, all experimental demonstrations of entanglement are designed to check Bell's inequality which is based on B...
In November 2017, Juan edro Hecht and Jorge Alejandro Kamlofsky submitted a quaternions/octonions based Diffie-Hellman key agreement protocol HK17 to NIST post quantum cryptography project. Daniel J. ...
We clarify and generalize a cube root algorithm in Fq proposed by Pocklington [1], and later rediscovered by Padr磑 and S碼ez [2]. We correct some mistakes in [2] and give a full generalization of the...
Recently, Juels and Rivest proposed honeywords (decoy passwords) to detect attacks against hashed password databases. For each user account, the legitimate password is stored with several honeywords...
Attribute-based encryption (ABE) which allows users to encrypt and decrypt messages based on user attributes is a type of one-to-many encryption. Unlike the conventional one-to-one encryption which ...
An efficient quantum modular exponentiation method is indispensible for Shor's factoring algorithm. But we find that all descriptions presented by Shor, Nielsen and Chuang, Markov and Saeedi, et al., ...
In the paper about the cryptosystem MST3, Svaba and Trung proposed a way to build a cryptosystem based on the concept of logarithmic signatures, and they choose Suzuki’s group, which is not abelian ...
Boneh and Franklin constructed the first practical Identity-Based Encryption (IBE) scheme in 2001. They also defined a formal security model for IBE and proved their scheme (BF-IBE) to be secure in...
We remark that the schemes [PhysRevLett.98.020503, PhysRevA.74.012315, PhysRevA.71.022321, PhysRevA.72.012304, PhysRevA.69.052307, PhysRevA.59.1829] are not secret sharing schemes as claimed.
Zeng and Keitel proposed an arbitrated quantum signature scheme In 2002. Recently, Curty and LÄutkenhaus pointed out that the protocol is not operationally specified. In a reply, Zeng gave more...
In 2007, `-Invertible Cycles (`IC) was proposed by Ding et al. This is one of the most efficient trapdoors for encryption/signature schemes, and of the mixed field type for multivariate quadratic pu...
In this contribution we investigate practical issues with imple- menting the NFS algorithm to solve the DLP arising in XTR-based cryptosys- tems. We can transform original XTR-DLP to a DLP instance ...
Recently, based on Guillou-Quisquater signature scheme, Saeednia proposed an identity-based society oriented signature scheme. However, in this note, we point out that Saeednia’s scheme does not sat...
In [3], a putative framing “attack” against the ACJT group signature scheme [1] is presented. This note shows that the attack framework considered in [3] is invalid. As we clearly illustrate, there...
In this paper we analyze and find an anomaly in the security proof of the identity-based encryption (IBE) scheme fullM-IBE of Wang and Cao [9], which is based on mBDHP. Here we give another proof fo...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...