نتایج جستجو برای: chryseobacyerium indologenes

تعداد نتایج: 213  

2013
Guangjun Fan Yongbin Zhou Dengguo Feng

Yoneyama et al. introduces the Leaky Random Oracle Model at ProvSec2008 to capture the leakages from the hash list of a hash function used by a cryptography construction due to various attacks caused by sloppy usages or implementations in the real world. However, an important fact is that such attacks would leak not only the hash list, but also other secret states (e.g. the secret key) outside ...

2005
Sven Laur Helger Lipmaa

During a conditional disclosure of secrets (CDS) protocol, Alice obtains a secret, held by Bob, if and only if her inputs to the protocol were “valid”. As an output masking technique, CDS protocol can be used as a subroutine in other protocols to guarantee either Bob-privacy or correctness against a malicious Alice. Using a simple seeded randomness extractor, we extend the Aiello-Ishai-Reingold...

2017
Yongge Wang

Recently, Wang (2016) introduced a random linear code based quantum resistant public key encryption scheme RLCE which is a variant of McEliece encryption scheme. In this paper, we introduce a revised version of the RLCE encryption scheme. The revised RLCE schemes are more efficient than the original RLCE scheme. Specifically, it is shown that RLCE schemes have smaller public key sizes compared ...

2001
Tatsuaki Okamoto David Pointcheval

The last few months, several new results appeared about the OAEP construction, and namely the RSA–OAEP cryptosystem. Whereas OAEP was believed to provide the highest security level (IND-CCA2), with an efficient exact security level, the effective security result had been showed to be incomplete. Nevertheless, the particular instantiation with RSA (which is anyway almost the sole application) ha...

2004
Bartosz Zoltak

We analyse the consequences of the specific properties of the key-setup phase in symmetric encryption schemes for their security. We find that key-setup routines satisfying IND-CNA and one-wayness allow to construct schemes which are provably secure against key-recovery attacks. We propose a specific cryptosystem for which we show that the key-setup routine ensures a significant increase in the...

2013
Guangjun Fan Yongbin Zhou Dengguo Feng

K. Yoneyama et al. introduces the Leaky Random Oracle Model at ProvSec2008, which only considers the leakage of the hash list of a hash function used by a cryptosystem due to various attacks caused by implementation or sloppy usages. However, an important fact is that such attacks not only leak the hash list of a hash function, but also leak other secret states outside the hash list of a crypto...

2013
Fenghe Wang Chunxiao Wang Yupu Hu

Using the Bonsai trees primitive and Gentry’s CPA-secure (chosen-plaintext attack) public-key encryption (PKE) scheme, we propose an efficient chosen-ciphtertext secure PKE scheme over lattice. If the decision variant of the learning with errors (LWE) problem is hard and the one-time signature used in this scheme is strong unforgeable, the proposed PKE scheme is indistinguishable against the ad...

Journal: :Journal of bacteriology 1953
S DAGLEY E A DAWES

Aerobacter aerogenes is able to utilize citric acid as sole source of carbon for growth in both aerobic and anaerobic conditions. From an analysis of fermentation liquors Deffner and Franke (1939) and Brewer and Werkman (1939) concluded that citric acid is decomposed anaerobically to oxalacetate and acetate as initial products. Manometric studies by the latter workers, using Aerobacter indologe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید