搜索结果: 1-3 共查到“知识库 军事学 detect”相关记录3条 . 查询时间(0.031 秒)
Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5
Logical cryptanalysis MD5 SHA-1 Satisfiability
2016/1/23
In recent years, studies about the SATisfiability Problem (short for SAT) were more and more numerous because of its conceptual simplicity and ability to express a large set of various problems. Wit...
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Proxy Re-encryption Re-encryption Verifiability Soundness
2016/1/4
In this paper, we introduce a new functionality for proxy re-encryption (PRE) that
we call re-encryption verifiability. In a PRE scheme with re-encryption verifiability (which we
simply call verifia...
Encryption is useful only if the decryption key has not
been exposed to adversaries; in particular, it requires that
the device performing the crypto operations is free of malware.
We explore ways ...