搜索结果: 1-15 共查到“军事学 Chinese”相关记录18条 . 查询时间(0.156 秒)
Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem
Threshold Secret Sharing Chinese Remainder Theorem Polynomial Ring
2018/11/16
Since (t,n)(t,n)-threshold secret sharing (SS) was initially proposed by Shamir and Blakley separately in 1979, it has been widely used in many aspects. Later on, Asmuth and Bloom presented a (t,n)(t,...
The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem
Discrete logarithm Hensel lift Multivaraible Chinese Remainder theorem
2016/12/10
The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem.
A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
implementation Irreducible Trinomials
2016/1/5
We show that the step “modulo the degree-n field generating irreducible polynomial” in the classical definition of the GF(2^n) multiplication operation can be avoided. This leads to an alternative rep...
Improved Linear Attacks on the Chinese Block Cipher Standard
Block Cipher SMS4 Linear Cryptanalysis
2014/3/7
The block cipher used in the Chinese Wireless LAN Standard (WAPI), SMS4, was recently renamed as SM4, and became the block cipher standard issued by the Chinese government. This paper improves the pre...
Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme
communication security CRTHACS Chinese remainder theorem hierarchical access control secure group communication
2013/4/18
The hierarchical access control scheme based on Chinese Reminder Theorem [49] (CRTHACS) was supposed to be capable of hiding hierarchical structure, but Geiselmann et al. [18] showed practical attacks...
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version)
rational cryptography computational strict Nash equilib-rium
2011/7/25
The design of rational cryptographic protocols is a recently created research area at the intersection of cryptography and game theory. At TCC'10, Fuchsbauer \emph{et al.} introduced two equilibrium n...
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version)
cryptographic protocols / rational cryptography computational strict Nash equilibrium stability with respect to trembles Asmuth-Bloom sharing
2012/3/27
The design of rational cryptographic protocols is a recently created research area at the intersection of cryptography and game theory. At TCC'10, Fuchsbauer \emph{et al.} introduced two equilibrium n...
Secret Sharing Extensions based on the Chinese Remainder Theorem
Verifiability joint random secret sharing proactive secretsharing Chinese Remainder Theorem Asmuth-Bloom
2010/3/16
In this paper, we investigate how to achieve verifiable secret
sharing (VSS) schemes by using the Chinese Remainder Theorem (CRT).
We first show that two schemes proposed earlier are not secure from...
Fault Resistant RSA Signatures:Chinese Remaindering in Both Directions
Diffierential Fault Analysis RSA Chinese Remainder Theorem
2010/2/1
Fault attacks are one of the most severe attacks against secure embed-
ded cryptographic implementations. Block ciphers such as AES, DES or
public key algorithms such as RSA can be broken with as fe...
COMPUTING HILBERT CLASS POLYNOMIALS WITH THE CHINESE REMAINDER THEOREM
space-efficient algorithm CM method elliptic curves
2009/9/27
We present a space-efficient algorithm to compute the Hilbert class
polynomial HD(X) modulo a positive integer P, based on an explicit form of
the Chinese Remainder Theorem. Under the Generalized Ri...
COMPUTING HILBERT CLASS POLYNOMIALS WITH THE CHINESE REMAINDER THEOREM
Computing Hilbert class polynomials Chinese Remainder Theorem
2009/9/22
We present a space-ecient algorithm to compute the Hilbert class
polynomial HD(X) modulo a positive integer P, based on an explicit form of
the Chinese Remainder Theorem. Under the Generalized Riem...
Compartmented Threshold RSA Based on the Chinese Remainder Theorem
threshold cryptography secret sharing Chinese remainder theorem
2009/6/8
In this paper we combine the compartmented secret
sharing schemes based on the Chinese remainder theorem
with the RSA scheme in order to obtain, as a novelty, a
dedicated solution for compartmented...
An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure
Encryption Algorithm Key-stream Generator Chinese Text Messages Character Internal Code Structure
2009/4/17
An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure.
Compartmented Secret Sharing Based on the Chinese Remainder Theorem
secret sharing compartmented access structure Chinese remainder theorem
2009/3/16
A secret sharing scheme starts with a secret and then derives from it certain shares
(or shadows) which are distributed to users. The secret may be recovered only by
certain predetermined groups. In...
Approaches to Transparency in Arms Control and Verification - A Canadian View of Chinese Perspectives
Transparency Arms Control and Verification Canadian View of Chinese Perspectives
2009/3/12
China and Canada represent nearly two opposite ends of a continuum
starting with near-total secrecy and ending at near-total transparency in matters of state. Canada advocates transparency, and Chin...