搜索结果: 1-6 共查到“军事学 basic”相关记录6条 . 查询时间(0.05 秒)
TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor
one-way trapdoor function algebraic attack
2014/3/6
In this paper, we design a novel one-way trapdoor function, and then propose a new multivariate public key cryptosystem called $\rm TOT$, which can be used for encryption, signature and authentication...
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
Algebraic Attack Algebraic Degree Algebraic Immunity Annihilator
2009/2/18
So far there is no systematic attempt to construct Boolean functions with maximum
annihilator immunity. In this paper we present a construction keeping in mind
the basic theory of annihilator immuni...
N-adic Summation-Shrinking Generator Basic properties and empirical evidences
Cryptography Encryption Algorithm Shrinking Generator Summation Generator
2009/1/19
The need of software-flexible stream ciphers has led to several alternative
proposals in the last few years. One of them is a new Pseudo Random Number
Generator (PRNG), named N-adic Summation-Shrink...
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
cryptographically sound security proof public-key kerberos
2008/12/2
We present a computational analysis of core Kerberos with
public-key authentication (PKINIT) in which we consider authentication
and key secrecy properties. These proofs rely on the Dolev-Yao
styl...
Computational Semantics for Basic Protocol Logic –A Stochastic Approach
cryptographic protocols formal methods first order logic
2008/9/1
This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first order logic.We first argue that th...