CORC

浏览/检索结果: 共17条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation 会议论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019-11-10
作者:  Zhang, Xiao;  Wu, Faguo;  Yao, Wang;  Wang, Zhao;  Wang, Wenhua
收藏  |  浏览/下载:11/0  |  提交时间:2019/12/30
Fully Homomorphic Public-Key Encryption with Two Ciphertexts based on Discrete Logarithm Problem 会议论文
Int. Conf. Info. Comm. Sec.
作者:  Tian Y(田园)
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/09
fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures 会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Chen Cheng; Chen Jie; Lim Hoon Wei; Zhang Zhenfeng; Feng Dengguo; Ling San; Wang Huaxiong
收藏  |  浏览/下载:23/0  |  提交时间:2013/09/22
weak keys of the full misty1 block cipher for related-key differential cryptanalysis 会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Lu Jiqiang; Yap Wun-She; Wei Yongzhuang
收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
Based on the attribute encrypted cloud storage scheme 会议论文
Shiyan, Hubei, China, June 21, 2013 - June 23, 2013
作者:  Zhu, Li-Ye
收藏  |  浏览/下载:22/0  |  提交时间:2020/11/15
biclique cryptanalysis of reduced-round piccolo block cipher 会议论文
8th International Conference on Information Security Practice and Experience, ISPEC 2012, Hangzhou, China, April 9, 2012 - April 12, 2012
Wang Yanfeng; Wu Wenling; Yu Xiaoli
收藏  |  浏览/下载:11/0  |  提交时间:2013/09/22
selective opening chosen ciphertext security directly from the ddh assumption 会议论文
6th International Conference on Network and System Security, NSS 2012, Wuyishan, Fujian, China, November 21, 2012 - November 23, 2012
Liu Shengli; Zhang Fangguo; Chen Kefei
收藏  |  浏览/下载:14/0  |  提交时间:2013/09/22
fault propagation pattern based relevant faulty ciphertexts filtering towards dfa on aes 会议论文
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Wang Na; Zhou Yongbin
收藏  |  浏览/下载:11/0  |  提交时间:2011/10/10
efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost 会议论文
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Chen Cheng; Zhang Zhenfeng; Feng Dengguo
收藏  |  浏览/下载:11/0  |  提交时间:2011/10/10
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption 会议论文
10th International Conference on Cryptography and Network Security, CANS 2011, December 10, 2011 - December 12, 2011
作者:  Okamoto, Tatsuaki;  Takashima, Katsuyuki
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/31


©版权所有 ©2017 CSpace - Powered by CSpace