搜索结果: 1-6 共查到“军事学 Part A”相关记录6条 . 查询时间(0.14 秒)
Beyond Bitcoin -- Part II: Blockchain-based systems without mining
blockchain technology dependable distributed computing systems
2016/12/12
Nowadays the decentralized transaction ledger functionality implemented through the blockchain technology is at the highest international interest because of the prospects both on opportunities and ri...
The notion of garbled random-access machines (garbled RAMs) was introduced by Lu and Ostrovsky
(Eurocrypt 2013). It can be seen as an analogue of Yao’s garbled circuits, that allows a user to garble
...
In EUROCRYPT 2013, Lu and Ostrovsky proposed the notion of Garbled RAM (GRAM) programs.
These GRAM programs are analogous to the classic result of Yao’s garbled circuits: a large encrypted
memory ca...
In this paper we study the security of summing the outputs of two independent hash functions, in an effort to increase the security of the resulting design, or to hedge against the failure of one of t...
Beyond Bitcoin - Part I: A critical look at blockchain-based systems
cryptocurrency blockchain mining
2015/12/18
After more than six years from the launch of Bitcoin, it has become evident
that the decentralized transaction ledger functionality implemented
through the blockchain technology can be used not only...
Towards Security Two-part Authenticated Key Agreement Protocols
key management authenticated protocol ID-based Key Compromise Impersonation
2009/3/2
We first present a new security 2-AK protocol, which is more secure and more efficient than previously proposed ones. Meanwhile, we point that Xie’s ID-2-AK protocol modified from McCullagh-Barreto i...