首页
社区
课程
招聘
[分享]Crytology + Information Security fields issue.
发表于: 2009-11-20 05:08 6778

[分享]Crytology + Information Security fields issue.

2009-11-20 05:08
6778
A d-Sequence based Recursive Random Number Generator.pdf (106.7 KB)
A Fast and Secure Implementation of Sflash.pdf (192.5 KB)
A Flexible Framework for Secret Handshakes.pdf (344.7 KB)
A Forward-Secure Public-Key Encryption Scheme.pdf (351.6 KB)
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decrypt.pdf (205.4 KB)
A Linear Distinguisher for Dragon.pdf (148.2 KB)
A new authentication scheme with anonymity for wireless environments.pdf (783.1 KB)
A NEW MAC--LAMA.pdf (87.3 KB)
A new stream cipher--DICING.pdf (103.6 KB)
A New Type of Cipher--DICING_CSB.pdf (59.8 KB)
A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security.pdf (249.4 KB)
A note on the Dwork–Naor timed deniable authentication.pdf (114.9 KB)
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings.pdf (417.7 KB)
A password authentication scheme with secure password updating.pdf (109.5 KB)
A Practical and Tightly Secure Signature Scheme Without Hash Function.pdf (578.7 KB)
A Practical Limit of Security Proof in the Ideal Cipher Model--Possibility of Using the Constant.pdf (345.4 KB)
A Practical Optimal Padding for Signature Schemes.pdf (580.0 KB)
A remote user authentication scheme using smart cards with forward secrecy.pdf (291.4 KB)
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks.pdf (297.8 KB)
A Secure Authentication Protocol in Mobile Communication System.pdf (339.1 KB)
A Simple and Efficient Solution to Remote User Authentication Using Smart Cards.pdf (168.0 KB)
A Weak Key Test for Braid Based Cryptography.pdf (342.2 KB)
An efficient authentication and access control scheme using smart cards.pdf (176.5 KB)
An efficient group key agreement protocol.pdf (111.1 KB)

[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!

上传的附件:
收藏
免费 0
支持
分享
最新回复 (6)
雪    币: 2096
活跃值: (100)
能力值: (RANK:420 )
在线值:
发帖
回帖
粉丝
2
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing.pdf (150.6 KB)
An efficient identity-based cryptosystem for end-to-end mobile security.pdf (552.7 KB)
An efficient nonce-based authentication scheme with key agreement.pdf (145.8 KB)
An Enhanced ID-based Deniable Authentication Protocol on Pairings.pdf (166.1 KB)
An enhanced remote login authentication with smart card.pdf (383.6 KB)
An enhanced remote user authentication scheme using smart cards.pdf (355.8 KB)
An Improved Designated-Verifier Proxy Signature Scheme.pdf (140.6 KB)
Analysis of an efficient group key agreement protocol.pdf (89.7 KB)
Applications of SAT Solvers to Cryptanalysis of Hash Functions.pdf (177.5 KB)
Biometrics Authenticated Key Agreement Scheme.pdf (227.1 KB)
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.pdf (174.4 KB)
Computationally Sound Mechanized Proofs of Correspondence Assertions.pdf (414.5 KB)
Crossword Puzzle Attack on NLS.pdf (192.4 KB)
Cryptanalysis and Improvement of User Authentication Scheme using Smart Cards for Multi-Server E.pdf (229.7 KB)
Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map.pdf (342.1 KB)
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart car.pdf (227.3 KB)
Cryptanalysis of 4-Pass HAVAL.pdf (168.2 KB)
Cryptanalysis of a modified remote user authentication scheme using smart cards.pdf (305.1 KB)
Cryptanalysis of an involutional block cipher using cellular automata.pdf (101.1 KB)
Cryptanalysis of chaotic stream cipher.pdf (178.4 KB)
Cryptanalysis of security enhancement for the timestamp-based password authentication scheme usi.pdf (346.5 KB)
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards.pdf (441.9 KB)
Cryptanalysis of two password authenticated key exchange protocols based on RSA.pdf (112.4 KB)
Cryptanalysis of white box DES implementations.pdf (267.5 KB)
Design and Primitive Specification for Shannon.pdf (374.4 KB)
Deterministic Authenticated-Encryption--A Provable-Security Treatment of the Key-Wrap Problem.pdf (420.7 KB)
Differential Power Analysis of Stream Ciphers.pdf (567.4 KB)
Direct Reduction of String (1,2)-OT to Rabin's OT.pdf (99.4 KB)
Do We Need to Vary the Constants--(Methodological Investigation of Block-Cipher Based Hash Funct.pdf (333.0 KB)
Dynamic Cryptographic Hash Functions.pdf (190.2 KB)
Efficient nonce-based remote user authentication scheme using smart cards.pdf (178.4 KB)
Efficient Password-Based Group Key Exchange.pdf (184.4 KB)
Efficient Short Signcryption Scheme with Public Verifiability.pdf (456.2 KB)
Efficient three-party key exchange using smart cards.pdf (352.6 KB)
上传的附件:
2009-11-20 05:37
0
雪    币: 2096
活跃值: (100)
能力值: (RANK:420 )
在线值:
发帖
回帖
粉丝
3
Efficient User Authentication and Key Agreement With Privacy Protection.pdf (153.6 KB)
Extended Double-Base Number System with applications to Elliptic Curve Cryptography.pdf (300.7 KB)
Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks.pdf (187.8 KB)
Faster and Shorter Password-Authenticated Key Exchange.pdf (297.8 KB)
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).pdf (393.0 KB)
Formal Security Treatments for IBE-to-Signature Transformation--Relations among Security Notions.pdf (262.2 KB)
Further attacks and comments on security of two remote user authentication schemes using smart c.pdf (324.0 KB)
Further improvement of an efficient password based remote user authentication scheme using smart.pdf (426.8 KB)
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity.pdf (135.5 KB)
How To Find Many Collisions of 3-Pass HAVAL.pdf (230.1 KB)
ID-based remote authentication with smart cards on open distributed system from elliptic curve c.pdf (197.9 KB)
Identity based KCDSA signcryption.pdf (418.5 KB)
Impossibility Proofs for RSA Signatures in the Standard Model.pdf (585.0 KB)
Improved efficient remote user authentication scheme using smart cards.pdf (337.9 KB)
Indexing Information for Data Forensics.pdf (312.2 KB)
Invisibility and Anonymity of Undeniable and Confirmer Signatures.pdf (256.4 KB)
Key Privacy for Identity Based Encryption.pdf (103.1 KB)
Linear Approximating to Integer Addition.pdf (87.4 KB)
Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards.pdf (209.5 KB)
Man in the Middle Attacks on Bluetooth.pdf (216.6 KB)
More efficient and secure remote user authentication scheme using smart cards.pdf (173.4 KB)
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL.pdf (151.8 KB)
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2.pdf (220.0 KB)
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards.pdf (439.2 KB)
Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on.pdf (441.5 KB)
Networked cryptographic devices resilient to capture.pdf (401.1 KB)
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security.pdf (240.3 KB)
New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC-HMAC Constructions.pdf (251.8 KB)
New remote user authentication scheme using smart cards.pdf (330.1 KB)
Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions.pdf (223.1 KB)
obner Basis Based Cryptanalysis of SHA-1.pdf (447.4 KB)
On the (Im-)Possibility of Extending Coin Toss.pdf (417.4 KB)
On the Limits of Point Function Obfuscation.pdf (226.9 KB)
On the security of a group key agreement protocol.pdf (78.7 KB)
On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan.pdf (182.8 KB)
Optimized Hash Tree for Authentication in Sensor Networks.pdf (220.8 KB)
上传的附件:
2009-11-20 05:53
0
雪    币: 2096
活跃值: (100)
能力值: (RANK:420 )
在线值:
发帖
回帖
粉丝
4
Parallel Authentication and Public-Key Encryption.pdf (220.3 KB)
Preimage Attack on Parallel FFT-Hashing.pdf (199.1 KB)
Protocols for RFID tag-reader authentication.pdf (615.0 KB)
Provable Secure Generalized Signcryption.pdf (256.5 KB)
Remark on the One-Time Password Authentication Protocol against Thelf Attacks.pdf (52.0 KB)
Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability.pdf (442.9 KB)
Robust Final-Round Cache-Trace Attacks Against AES.pdf (259.1 KB)
Secret Handshakes from CA-Oblivious Encryption.pdf (209.3 KB)
Secret sharing schemes with partial broadcast channels.pdf (240.7 KB)
Secure communication between set-top box and smart card in DTV broadcasting.pdf (404.0 KB)
Security Analysis of a Password Authenticated Key Exchange Protocol.pdf (176.4 KB)
Security enhancement for a dynamic ID-based remote user authentication scheme.pdf (115.7 KB)
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-l.pdf (244.4 KB)
Security enhancement for the timestamp-based password authentication scheme using smart cards.pdf (272.5 KB)
Security of two remote user authentication schemes using smart cards.pdf (281.5 KB)
Some remarks on a remote user authentication scheme using smart cards with forward secrecy.pdf (340.2 KB)
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i.pdf (205.1 KB)
Some Results on Anonymity in Hybrid Encryption.pdf (498.6 KB)
Special block cipher family DN and new generation SNMAC-type hash function family HDN.pdf (927.0 KB)
The Cramer-Shoup Strong-RSASignature Scheme Revisited.pdf (213.1 KB)
The Design and Analysis of a Hash Ring-iterative Structure.pdf (133.4 KB)
The number of transversals in a Latin square.pdf (247.7 KB)
The Security of DSA and ECDSA.pdf (224.8 KB)
Two Birds One Stone--Signcryption Using RSA.pdf (223.5 KB)
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers .pdf (216.3 KB)
Two Secure Remote User Authentication Schemes using Smart Cards.pdf (201.1 KB)
Two Trivial Attacks on Trivium.pdf (182.2 KB)
Weakness of the Synchro-Difference LKH Scheme for Secure Multicast.pdf (167.1 KB)
上传的附件:
2009-11-20 06:09
0
雪    币: 2096
活跃值: (100)
能力值: (RANK:420 )
在线值:
发帖
回帖
粉丝
5
Weaknesses and improvements of an efficient password based remote user authentication scheme usi.pdf (767.9 KB)
Weaknesses of the FORK-256 compression function.pdf (232.8 KB)
Zheng and Seberry___s public key encryption scheme revisited.pdf (284.5 KB)
上传的附件:
2009-11-20 06:11
0
雪    币: 101
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
6
感謝樓主提供這麼多好的資料,回去補英文去了。
2009-11-20 08:53
0
雪    币: 2096
活跃值: (100)
能力值: (RANK:420 )
在线值:
发帖
回帖
粉丝
7
趁我要離開前,能把有用的東西上傳上來就傳上來,這段時間,大家所獲得的知識與技術都是全球同步及最新的。
不少日本來的博士及韓國的博士都來這做博士後研究。
之後,對不起,我就不敢保證了。
2009-11-20 12:43
0
游客
登录 | 注册 方可回帖
返回
//