نتایج جستجو برای: distinguishing number

تعداد نتایج: 1193552  

2007
Alexander W. Dent Qiang Tang

The concept of timed-released encryption with pre-open capability (TRE-PC) was introduced by Hwang, Yum and Lee. In a TREPC scheme, a message is encrypted in such a way that it can only be decrypted at a certain point in time or if the sender releases a piece of trapdoor information known as a pre-open key. This paper examines the security model for a TRE-PC scheme, demonstrates that a TRE-PC s...

Journal: :The Journal of contemporary health law and policy 1990
M A Roberts

Journal: :Discrete Mathematics 2009
Simon R. Blackburn Stefanie Gerke

A uniform random intersection graph G(n,m, k) is a random graph constructed as follows. Label each of n nodes by a randomly chosen set of k distinct colours taken from some finite set of possible colours of size m. Nodes are joined by an edge if and only if some colour appears in both their labels. These graphs arise in the study of the security of wireless sensor networks, in particular when m...

Journal: :IACR Cryptology ePrint Archive 2003
Kyung-Ah Shim

Recently, Al-Riyami and Paterson [1] proposed four authenticated tripartite key agreement protocols which make use of Weil pairing. In this paper, we show that the protocols are insecure against the man-in-the middle attack, key compromise impersonation attack and several known-key attacks.

Journal: :IACR Cryptology ePrint Archive 2013
Mohammad Ali Orumiehchiha Josef Pieprzyk Ron Steinfeld Harry Bartlett

Our contributions are applying distinguishing attack on Linearly Filtered NLFSR as a primitive or associated with filter generators. We extend the attack on linear combinations of Linearly Filtered NLFSRs as well. Generally, these structures can be examined by the proposed techniques and the criteria will be achieved to design secure primitive. The attacks allow attacker to mount linear attack ...

Journal: :Inf. Process. Lett. 1996
Josep Domingo-Ferrer

An additive and multiplicative privacy homomorphism is an encryption function mapping addition and multiplication of cleartext data into two operations on encrypted data. One such privacy homomorphism is introduced which has the novel property of seeming secure against a known-cleartext attack. An application to multilevel statistical computation is presented, namely classiied retrieval of exac...

Journal: :The Electronic Journal of Combinatorics 2007

1974
J. L. Newmeyer Dennis Sivers

We propose that a measurement of the number of protons and antiprotons in the hemisphere opposite a large transverse momentum proton can distinguish between two important models for large transverse momentum processes. The Parton Jet Model (PJM), where the underlying mechanism is assumed to be quark-quark scattering, is characterized by a surplus of protons over antiprotons in the jet opposite ...

Journal: :The Computer Journal 1973

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید