军事学 >>> 军事学
搜索结果: 1-12 共查到军事学 DSA相关记录12条 . 查询时间(0.203 秒)
The American signature standards DSA and ECDSA, as well as their Russian and Chinese counterparts GOST 34.10 and SM2, are of utmost importance in the current security landscape. The mentioned schemes ...
TLS and SSH are two of the most commonly used protocols for securing Internet traffic. Many of the implementations of these protocols rely on the cryptographic primitives provided in the OpenSSL libra...
While threshold signature schemes have been presented before, there has never been an optimal threshold signature algorithm for DSA. Due to the properties of DSA, it is far more difficult to create ...
We prove that a system of linear congruences of a particular form has at most a unique solution below a certain bound which can be computed efficiently. Using this result we develop attacks against ...
In the ordinary security model for signature schemes, we consider an adversary that may forge a signature on a new message using only his knowledge of other valid message and signature pairs. To tak...
In this paper, using the LLL reduction method and an algorithm for the computation of the integral points of a class of conics, we find small solutions of a class of bivariate modular equations of s...
Q We consider the task of computing power products 1ik gei i (“multi-exponentiation”) where base elements g2, . . ., gk are fixed while g1 is variable between multi-exponentiations but may repea...
A new kind of attack on the non-repudiation property of digital signature schemes is presented. We introduce a notion of key-collisions, which may allow an attacker to claim that the message (presen...
We present an attack on DSA smart-cards which combines physical fault injection and lattice reduction techniques. This seems to be the first (publicly reported) physical experiment allowing to concr...
We introduce a message attack against DSA and show that the security of DSA is indeed reduced to the following problem, i.e., find µ 2 Zq such that z = (^gµ mod p)mod q where Ordp(^g) = ...
We consider the task of computing power products Q1ik gei i (“multi-exponentiation”) where base elements g2, . . ., gk are fixed while g1 is variable between multi-exponentiations but may repeat, ...
自证明签名对验证者来说一次仅验证了两个签名,而在PMI系统中,验证者除了要认证用户身份,其中包括两个验证:一个是验证用户的签名,另一个是验证CA颁发的公钥证书,还需要验证AA颁发的属性证书。针对此问题,该文对自证明签名做了一定的扩展,提出了扩展自证明签名ESCS方案,ESCS由验证两个签名扩展到可同时验证3个签名,此后又对ESCS方案做了进一步的扩展,扩展后的ESCS方案可以同时验证多个签名。

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...