设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
Springer电子图书(2)
CNKI学位论文(24)
知网期刊论文(2)
在“
SpringerLink电子期刊
”中,
命中:
22
条,耗时:小于0.01 秒
在所有数据库中总计命中:
28
条
1.
Efficient One-Sided Adaptively Secure Computation
作者:
Carmit Hazay
;
Arpita Patra
关键词:
Secure two
;
party computation
;
Adaptive security
;
Non
;
committing
encryption
;
Oblivious transfer
刊名:Journal of Cryptology
出版年:2017
2.
Removing Erasures with Explainable Hash Proof Systems
关键词:
Oblivious transfer
;
Password authenticated key exchange
;
Erasures
;
Universal composability
;
Adaptive adversaries
刊名:Lecture Notes in Computer Science
出版年:2017
3.
Adaptive Security with Quasi-Optimal Rate
关键词:
Adaptive security
;
Non
;
committing
encryption
;
LWE
;
Ring
;
LWE
刊名:Lecture Notes in Computer Science
出版年:2016
4.
Blind attribute-based
encryption
and oblivious transfer with fine-grained access control
作者:
Alfredo Rial
刊名:Designs, Codes and Cryptography
出版年:2016
5.
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
关键词:
public key
encryption
;
puncturable key encapsulation mechanism
;
chosen ciphertext security
;
sender non
;
committing
encryption
;
key
;
dependent message secure symmetric
;
key
encryption
刊名:Lecture Notes in Computer Science
出版年:2015
6.
Non-
committing
Encryption
from Φ-hiding
刊名:Lecture Notes in Computer Science
出版年:2015
7.
Selective Opening Security for Receivers
关键词:
Selective opening attacks
;
Encryption
schemes
;
Non
;
committing
encryption
刊名:Lecture Notes in Computer Science
出版年:2015
8.
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
作者:
Shengli Liu (14)
Kenneth G. Paterson (15)
14. Department of Computer Science and Engineering
;
Shanghai Jiao Tong University
;
Shanghai
;
200240
;
China
15. Information Security Group
;
Royal Holloway
;
University of London
;
Egham
;
London
刊名:Lecture Notes in Computer Science
出版年:2015
9.
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
作者:
Ran Canetti (17) (20)
Shafi Goldwasser (18) (19)
Oxana Poburinnaya (20)
17. Tel-Aviv University
;
Israel
20. Boston University
;
USA
18. Weizmann
;
Israel
19. MIT
;
USA
刊名:Lecture Notes in Computer Science
出版年:2015
10.
One-Sided Adaptively Secure Two-Party Computation
作者:
Carmit Hazay (17)
Arpita Patra (18)
关键词:
Adaptively Secure Computation
;
Non
;
Committing
Encryption
;
Oblivious Transfer
刊名:Lecture Notes in Computer Science
出版年:2014
1
2
3
按检索点细分(22)
题名(8)
关键词(11)
文摘(21)
按出版年细分(22)
2017年(2)
2016年(2)
2015年(6)
2014年(2)
2011年(1)
2010年(1)
2009年(3)
2008年(1)
2007年(2)
2006年(2)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.