>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-12 共查到one-way function相关记录12条 . 查询时间(0.156 秒)
Separating public key encryption from one way functions is one of the fundamental goals of complexity-based cryptography. Beginning with the seminal work of Impagliazzo and Rudich (STOC, 1989), a sequ...
We study a method for key predistribution in a network of n users where pairwise keys are computed by hashing users’ IDs along with secret information that has been (pre)distributed to the network u...
We show how to extract an arbitrary polynomial number of simultaneously hardcore bits from any one-way function. In the case the one-way function is injective or has polynomially-bounded pre-image siz...
We show \emph{unconditionally} that the existence of commitment schemes implies the existence of \emph{constant-round} non-malleable commitments; earlier protocols required additional assumptions such...
Efficient group rekeying is an important building-block for secure group communications. Although Sherman et al. claimed that their group rekeying scheme, OFT (One-way Function Tree) achieves perfect ...
It is well-known that the k-wise product of one-way functions remains one-way, but may no longer be when the k inputs are correlated. At TCC 2009, Rosen and Segev introduced a new notion known as Co...
Goldreich (ECCC 2000) suggested a simple construction of a candidate one-way function f : {0, 1}n → {0, 1}m where each bit of output is a fixed predicate P of a constant number d of (random) inpu bits...
VMPC One-Way Function     VMPC  One-Way Function       2009/4/9
The VMPC function is a combination of two basic operations – permutation composition and integer addition. The function resulting from this combination shows to have very high resistance to invert...
We show that every language in NP has a statistical zero-knowledge argument system under the (minimal) complexity assumption that one-way functions exist. In such protocols, even a computationally u...
In this paper we study the problem of meromorphic function sharing one small function with its derivative and improve the results of K.-W. Yu and I. Lahiri and answer the open questions posed by K.-W....
making an arbitrary binary string fit as a fixed size cipher key (via hashing) one could use an arbitrary string x as both plaintext and key to generate a ciphertext, y defined as “the crypto square ...
In this paper, we introduce new hash function design princi- ples with variable output lengths (multiple of n). It is based on a function or a block cipher which has output size n. In the random ora...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...