نتایج جستجو برای: eternal m secure set

تعداد نتایج: 1205644  

Journal: :JOURNAL OF INDIAN AND BUDDHIST STUDIES (INDOGAKU BUKKYOGAKU KENKYU) 1987

2004
Jens Groth

Recently Canetti, Krawczyk and Nielsen defined the notion of replayable adaptive chosen ciphertext attack (RCCA) secure encryption. Essentially a cryptosystem that is RCCA secure has full CCA2 security except for the little detail that it may be possible to modify a ciphertext into another ciphertext containing the same plaintext. We investigate the possibility of perfectly replayable RCCA secu...

Journal: :British Journal for the History of Philosophy 2009

Journal: :EURASIP J. Wireless Comm. and Networking 2004
Jian Ren

Pseudo-random sequences with good correlation properties and large linear span are widely used in code-division multiple-access (CDMA) communication systems and cryptology for reliable and secure information transmission. In this paper, sequences with long period, large complexity, balance statistics and low correlation properties are constructed from the addition of m-sequences with pairwise-p...

Journal: :Des. Codes Cryptography 2013
Marjan Bazrafshan Tran van Trung

An (N ;n,m, {w1, . . . , wt})-separating hash family is a set H of N functions h : X −→ Y with |X| = n, |Y | = m, t ≥ 2 having the following property. For any pairwise disjoint subsets C1, . . . , Ct ⊆ X with |Ci| = wi, i = 1, . . . , t, there exists at least one function h ∈ H such that h(C1), h(C2), . . . , h(Ct) are pairwise disjoint. Separating hash families generalize many known combinator...

Journal: :isecure, the isc international journal of information security 0
p. rastegari department of electrical and computer engineering, isfahan university of technology, isfahan, iran m. berenjkoub department of electrical and computer engineering, isfahan university of technology, isfahan, iran

certificateless public key cryptography (cl-pkc) is a useful method in order to solve the problems of traditional public key infrastructure (i. e. large amount of computation, storage and communication cost for managing certificates) and id-based public key cryptography (i. e. key escrow problem), simultaneously. a signcryption scheme is an important primitive in cryptographic protocols which p...

Journal: :Religious Studies 2015

Journal: :Physics Reports 2000

Journal: :Conservation Biology 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید