搜索结果: 1-3 共查到“军事学 consequences”相关记录3条 . 查询时间(0.125 秒)
The equivalence of the random-oracle model and the ideal-cipher model has been studied in a long series of results. Holenstein, Künzler, and Tessaro (STOC, 2011) have recently completed the picture po...
Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions
Practical consequences narrow-pipe hash designs ideal random functions
2010/7/14
In a recent note to the NIST hash-forum list, the following observation was presented: narrow-pipe hash functions differ significantly from ideal random functions $H:\{0,1\}^{N} \rightarrow \{0,1\}^n$...
Some General Consequences on Chosen-ciphertext Anonymity in Public-Key Encryption
Computational Cryptography Provable Security Anonymity Master-key Anonymity
2008/8/27
In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired. In this paper some new and general concepts in public-key encry...