provablesecurity相关论文
...
In the post quantum era,public key cryptographic scheme based on lattice is considered to be the most promising cryptosy......
In 2010,Lee et al proposed two simple and efficient three-party password-authenticated key exchange protocols that had b......
Broadcast protocol is widely used in wireless sensor networks (WSNs).Any node can transmit the data to the rest of nodes......
In the information era, more and more data are produced, which imposes a heavy burden on local storage.Fortunately, ......
Efficient searching on encrypted data outsourced to the cloud remains a research challenge.Identity-based encryption......
As the most prevailing two-factor authentication mechanism,smart-card-based password authentication has been a subje......
为认证和关键建立的协议在无线环境有特殊要求。这篇论文论述新关键协议协议 HAKA (家服务者帮助了关键同意) 为漫步情形。它被一......