... Escrow Chapter 5—Advanced Protocols 5.1 Zero-Knowledge Proofs 5.2 Zero-Knowledge Proofs of Identity 5.3 Blind Signatures 5.4 Identity-Based Public-Key Cryptography < /b> 5.5 Oblivious Transfer 5.6 Oblivious Signatures 5.7 ... privacy; cryptography < /b> products may be declared illegal, but the information will never be. How to Read This Book I wrote Applied < /b> Cryptography < /b> to b...
Ngày tải lên: 31/03/2014, 15:54
... class="bi x0 y0 w1 h1" alt=""
Ngày tải lên: 17/03/2014, 14:43
applied cryptography & network security - 2nd international conference, acns 2004
... second is based on random oracle and suitable for probabilistic encryption component. We remark that for the latter, generic construction based on non-interactive zero-knowledge proof is also capable, ... encrypted or decrypted as a whole. Before a write could succeed, the page needed to be decrypted, the plaintext added at the appropriate position, and then the altered page data encrypted an...
Ngày tải lên: 25/03/2014, 11:07
introduction to cryptography - principles & applications, 2nd ed.
... (B, r A ) (where B repre- sents Bob’s identity), s 1 := Sign s A (t 1 ) and sends (t 1 , s 1 ) to Bob. 2. Bob verifies Alice’s signature, checks that he is the intended recipient, chooses r B and ... are used instead of encrypt and decrypt. 2 Each plaintext character is replaced by the character 3 to the right modulo 26, i.e., a is replaced by d, b by e,. . ., x by a, y by b and z by c...
Ngày tải lên: 25/03/2014, 11:47
elliot, b. (2002). fiber optic cabling (2nd ed.)
... Multiplexing DFB Distributed Feedback (laser) DMD Differential Modal Delay DSF Dispersion Shifted Fibre DWDM Dense Wavelength Division Multiplexing dB decibel EDFA Erbium Doped Fibre Amplifier EF Encircled ... speci- fication) installed to provide high-speed communication paths which have been designed to be reliable with minimal mean-time-to-repair figures. Communications cabling has become...
Ngày tải lên: 18/04/2014, 12:28