Cryptology ePrint Archive. Report 2014/132.K. Lee, D. H. Lee, and J. H. Park, "Efficient revocable identity- based encryption via subset difference methods," Designs, Codes and Cryptography, vol. 85, no. 1, pp. 39-76, 2017.
D Halevy,A Shamir - International Cryptology Conference on Advances in Cryptology 被引量: 827发表: 2002年 Model checking with layered localization reduction A method for verifying a property of a complete model of a system under study includes abstracting at least some of the variables from the ...
Desmedt, Y., Quisquater, JJ. (1987). Public-key Systems Based on the Difficulty of Tampering (Is there a difference between DES and RSA?). In: Odlyzko, A.M. (eds) Advances in Cryptology — CRYPTO’ 86. CRYPTO 1986. Lecture Notes in Computer Science, vol 263. Springer, Berlin, Heide...
This paper discusses system implications of cryptography to a communications system by exploring the intersection between communication over nonsecure channels (cryptology) and communication over noisy channels (coding theory), by giving theoretical background and discuss some applications. Encryption can be...
Hash functions were introduced in cryptology as a tool to protect the integrity of information. SHA-1 and MD-5 are among the most commonly used hash function message digest algorithms. Scientists have found collision attacks on SHA-1, MD-5 hash functions so the natural response to overcome ...