搜索结果: 1-4 共查到“军队指挥学 Overview”相关记录4条 . 查询时间(0.125 秒)
General Overview of the Authenticated Schemes for the First Round of the CAESAR Competition
authenticated encryption CAESAR competition symmetric cryptography
2016/1/6
The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer
advantages over AES-GCM and are suitable for widespread adoption. At the moment, 48 remaining first-round
s...
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
Password Hashing Competition Overview Garbage-Collector Attacks
2016/1/6
In this work we provide an overview of the candidates of
the Password Hashing Competition (PHC) regarding to their functionality,
e.g., client-independent update and server relief, their security, e...
Overview of Turbo-Code Reconstruction Techniques
Turbo-Code Reconstruction Techniques recursive systematic coders turbo-code encoders
2009/6/11
In this paper we analyze different techniques to
blindly recover the parameters of turbo-code encoders with only
the knowledge of noisy eavesdropped binary stream. We compare
different strategies t...
Overview of Key Agreement Protocols
Key Agreement Protocols AK Authenticated Die-Hellman key agreement
2009/2/26
The emphasis of this paper is to focus on key agreement. To this aim, we address a selfcontained,up-to-date presentation of key agreement protocols at high level. We have attempted to provide a brief ...