نتایج جستجو برای: random key representation

تعداد نتایج: 1030562  

Journal: :Inf. Process. Lett. 2008
Rainer Steinwandt Viktória I. Villányi

A one-time signature scheme using run-length encoding is presented, that in the random oracle model offers security against chosen-message attacks. For parameters of interest, the proposed scheme enables about 33% faster verification with a comparable signature size than a construction of Merkle and Winternitz. The public key size remains unchanged (1 hash value). The main price for the faster ...

2016
Xavier Bultel Pascal Lafourcade

We present a public key encryption primitive called A Posteriori Openable Public Key Encryption (APO-PKE). In addition to conventional properties of public key cryptosystems, our primitive allows each user, who has encrypted messages using different public keys, to create a special decryption key. A user can give this key to a judge to open all messages that have been encrypted in a chosen time...

Journal: :IACR Cryptology ePrint Archive 2011
Shaohua Tang Jintai Ding Yujun Liang

A new fundamental and secure group key management approach with a group controller GC using the theory of polynomial functions over a vector space over finite field is developed, where each member in the group corresponds to a vector in the vector space and the GC computes a central vector, whose inner product with every member’s ID vector are identical. The central vector is published and each...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان همدان - دانشکده ادبیات و علوم انسانی 1390

abstract this study is an attempt to determine the effect of nano- technology education on science lesson for fifth grade in primary school in the city of kermanshah. this research is experimental and is conducted in the from of pre-test and post- test for the control group. an achievement test was administered to determine the rate of learning in the students. the research is an applied one. ...

2012

The proposed method is based on 2-dimensional quantization of distance vectors between biometrics features and pairs of random vectors in this method the concept of changeable cryptographic key generation using face biometrics signal. A previously introduced scheme, fuzzy vault, is utilized for secure binding of randomly generated key with extracted biometrics features. The major technical diff...

1996
Dirk-Jan Povel

To study the elementary expectations that arise in the perception of tonal music, an exploratory study was performed in which subjects heard a sequence of four chords (to induce a key or tonality) followed by one tone (1 of the 12 tones within an octave), and indicated which tone they expected to be the next tone. Responses were divided into three groups: a random, afifth, and a tonal group. Th...

Journal: :Journal of Mathematical Analysis and Applications 1990

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید