The most lethal and most expensive weapon in the Gulf War was the electronic information system deployed by the multinational troops. This information system was large-scale, advanced in technology, strict in organization, and high in operational efficiency, providing the overall, precise, timely, a
β¦ LIBER β¦
Distribution of random session key based on key-insulated public-key cryptosystems
β Scribed by Lu Hai-jun; Su Yun-xue; Zhu Yue-fei
- Publisher
- Wuhan University
- Year
- 2005
- Tongue
- English
- Weight
- 399 KB
- Volume
- 10
- Category
- Article
- ISSN
- 1007-1202
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Public_key cryptosystems based on linear
π
Article
π
1997
π
Elsevier Science
π
English
β 111 KB
A threshold key escrow scheme based on p
β
Zhenfu Cao
π
Article
π
2001
π
SP Science China Press
π
English
β 447 KB
Public Key Cryptosystems Based on Drinfe
β
Thomas Scanlon
π
Article
π
2001
π
Springer
π
English
β 47 KB
A note on the mathematics of public-key
β
Albert A. Mullin
π
Article
π
1984
π
Elsevier Science
π
English
β 320 KB
Clouds over a public key cryptosystem ba
β
MarΔ±́a Isabel GonzΓ‘lez Vasco; Rainer Steinwandt
π
Article
π
2001
π
Elsevier Science
π
English
β 51 KB
We demonstrate that with the given specifications the Lyndon words based public key cryptosystem suggested by Siromoney and Mathew [Inform. Process. Lett. 35 (1990) 33-36] is susceptible to very simple ciphertext only attacks. Consequently, in the present form this system cannot be considered as suf
A Public Key Cryptosystem Based on Non-a
β
Wolfgang Lempken; Trung van Tran; Spyros S. Magliveras; Wandi Wei
π
Article
π
2008
π
Springer
π
English
β 293 KB