军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 Subgroups相关记录15条 . 查询时间(0.171 秒)
A group-characterizable random variable [Chan and Yeung 2002] is induced by a joint distribution on the (left) cosets of some subgroups of a main group. A homomorphic secret sharing scheme [Benaloh 19...
In contrast to related work which encrypts and acts on each bit of the input separately, our protocol compares multiple input bits simultaneously within a single ciphertext. Compared to the related pr...
This paper presents the basic concepts of the Edwards curves, twisted Edwards curves and the point addition laws on these curves. The main result is the parameterization of the Edward curve with the g...
A Certain Family of Subgroups of Zn⋆ Is Weakly Pseudo-Free under the General Integer Factoring Intractability Assumption.
In this short report we analyse the security of three schemes proposed by J. H. Park et al. in "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups". The schemes make ...
We present a new Identity-Based Encryption (IBE) scheme from a trapdoor subgroup of Z∗n for an RSA modulus n. In a trapdoor subgroup of Z∗n, a subgroup order is hidden and can be used as a...
A presentation of a group with two generators having unsolvable word problem and an explicit countable presentation of Mihailova subgroup of F2 × F2 with finite number of generators are given. Where...
We propose new squaring formulae for cyclotomic subgroups of certain finite fields. Our formulae use a compressed representation of elements having the property that decompression can be performed at ...
Bilinear pairings derived from supersingular elliptic curves of embedding degrees 4 and 6 over finite fields F2m and F3m, respectively, have been used to implement pairing-based cryptographic protoc...
Let E be an elliptic curve dened over a nite eld. Balasubramanian and Koblitz have proved that if the `th roots of unity ` is not contained in the ground eld, then a eld extension of the groun...
Let E be an elliptic curve dened over a nite eld. Balasubramanian and Koblitz have proved that if the `th roots of unity ` is not contained in the ground eld, then a eld extension of the groun...
Boneh and Venkatesan have proposed a polynomial time algorithm for recovering a "hidden" element ® 2 IFp, where p is prime, from rather short strings of the most significant bits of the residue ...
This paper gives a survey of some ways to improve the efficiency of discrete log-based cryptography by using the restriction of scalars and the geometry and arithmetic of algebraic tori and abelian ...
We use the Bateman-Horn conjecture to study the order of the set of Fq-rational points of primitive subgroups that arise in torus-based cryptog- raphy. We provide computational evidence to support ...
In this paper we obtain conditions on the divisors of the group order of the Jacobian of a hyperelliptic genus 2 curve, generated by the complex multiplication method described by Weng (2003) and Ga...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...