搜索结果: 1-3 共查到“军事学 modification”相关记录3条 . 查询时间(0.123 秒)
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
insider attacks chosen ciphertext attacks modification
2018/4/25
At ACISP 2017, Wu et al. presented an identity-based encryption with equality test (IBEET) that considers to prevent insider attacks. To analyze its security, they proposed a new security notion for I...
Self-loop-based Modification of Smart and Vercauteren’s Fully Homomorphic Encryption
Fully Homomorphic Encryption Polynomial Coset Problem Sparse Subset Sum Problem
2011/3/11
This paper modifies the Smart and Vercauteren’s fully homomorphic encryption scheme [SV10] by applying self-loop bootstrappable technique. The security of the modified scheme only depends on the hardn...
In CRYPTO 2005, Xiaoyun Wang, Hongbo Yu and Yiqun Lisa Yin proposed an efficient
collision attack on SHA-0. Collision messages are found with complexity 239 SHA-0 operations by using
their method. C...