您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. 3-0-3:去中心化的区块链应用程序:区块链的PoC-源码

  2. 三三三:极简主义x区块链x概念x项目 区块链演示 一个简单的去中心化区块链网络应用程序:去中心化区块链的PoC {概念证明}。 通过创建一个学习区块链技术! BlockChain概念:幕后花絮 什么是区块链? 区块链不过是一个简单的记录列表,或者正如流行语所解释的那样,这些区块是通过密码技术链接的。 构成区块链的3种成分: 1. Cryptographic Hash of the previous block 2. The timestamp 3. The transacti
  3. 所属分类:其它

    • 发布日期:2021-02-13
    • 文件大小:442368
    • 提供者:weixin_42121754
  1. Permutation Polynomials over Zpn and Their Randomness

  2. Permutation polynomials over Zpn are useful in the design of cryptographic algorithms. In this paper, we obtain an equivalent condition for polynomial functions over Zpn to be permutations, and this equivalent condition can help us to analysis the ra
  3. 所属分类:其它

    • 发布日期:2021-02-12
    • 文件大小:334848
    • 提供者:weixin_38500047
  1. A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext

  2. Attribute-based encryption (ABE) is a new cryptographic primitive which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. Key-policy attribute-based encryption (KP-ABE) is a
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:155648
    • 提供者:weixin_38575421
  1. An efficient attribute-based signature scheme with claim-predicate mechanism

  2. Attribute-based signature is a promising cryptographic primitive that allows a signer to sign a message with a signing policy to convince the verifier that the signer holds a subset of attributes satisfying the signing policy. A successful execution
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:346112
    • 提供者:weixin_38663193
  1. A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function

  2. With the advent of cloud computing, more and more individuals and companies are motivated to outsource their data and services to clouds. As for the privacy and security reasons, sensitive data should be encrypted prior to outsourcing. However, encry
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:465920
    • 提供者:weixin_38661852
  1. Efficient and Information-Theoretical Secure Verifiable Secret Sharing over Bilinear Groups

  2. Verifiable secret sharing (VSS) is an important technique which has been used as a basic tool in distributed cryptosystems, secure multi-party computations, as well as safe guarding some confidential information such as cryptographic keys. By now, so
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:171008
    • 提供者:weixin_38745859
  1. Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC

  2. Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. The design of secure remote user authentication schemes based on elliptic curve crypto-graphy (ECC) for mobile app
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:367616
    • 提供者:weixin_38515573
  1. Security flaws in two improved remote user authentication schemes using smart cards

  2. Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. In this paper, we analyze two recent proposals in the area of password-based remote user authentication using smar
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:197632
    • 提供者:weixin_38514805
  1. Beyond-birthday secure domain-preserving PRFs from a single permutation

  2. This paper revisits the fundamental cryptographic problem of building pseudorandom functions (PRFs) from pseudorandom permutations (PRPs).We prove that, SUMPIP, i.e. P⊕P^{−1}, the sum of a PRP and its inverse, and EDMDSP, the single-permutation varia
  3. 所属分类:其它

    • 发布日期:2021-02-08
    • 文件大小:653312
    • 提供者:weixin_38628362
  1. 通用加密工具,支持AWS KMS, GCP KMS, GnuPG和Azure密钥库- VirtusLab/crypt-源码

  2. crypt Universal cryptographic tool with AWS KMS, GCP KMS and Azure Key Vault support. Maturity Provider Maturity AWS KMS beta Azure Key Vault beta GCP KMS alpha GPG (GnuPG) alpha Installation Binaries Downloading binaries with bash: OS=$(uname -s | t
  3. 所属分类:其它

    • 发布日期:2021-01-27
    • 文件大小:241664
    • 提供者:weixin_38693586
  1. 部署与手动搭建fabric1.1.0网络超详细笔记

  2. 我是使用阿里云的服务器来进行hyperledger fabric1.1.0网络的实验,下面是学习过程中记录的部署环境的过程及手动实现my-first区块网络的记录 先附上常用词汇表,来自于这篇博客 MSP:Membership service provider 会员服务提供者 BCCSP:blockchain(前两个字母BC) cryptographic service provider 区域链加密服务提供者 ab:atomic broadcast原子(操作)广播 lscc:lifecycle(
  3. 所属分类:其它

    • 发布日期:2021-01-20
    • 文件大小:1048576
    • 提供者:weixin_38557768
  1. 意法半导体STM32微控制器加密算法库通过美国安全标准

  2. 中国,2016年7月19日 ——横跨多重电子应用领域、的半导体供应商意法半导体(STMicroelectronics,简称ST;纽约证券交易所代码:STM)的STM32微控制器加密算法库成功通过美国密码算法验证体系(US Cryptographic Algorithm Validation Program,CAVP)验证,有助于客户快速、经济地提高新产品的安全性。     作为STM32Cube软件包的扩展模块,X-CUBE-CRYPTOLIB算法库可直接用于基于STM32的注重安全的产品,包
  3. 所属分类:其它

    • 发布日期:2021-01-20
    • 文件大小:50176
    • 提供者:weixin_38683895
  1. Position based key exchange: definitions and implementations

  2. Chandran, et al. introduce the direction of position based cryptography at CRYPTO 2009. In position based cryptography, the position of a party is used to be its unique “credential” in order to realize the cryptographic tasks, such as position based
  3. 所属分类:其它

    • 发布日期:2021-01-20
    • 文件大小:757760
    • 提供者:weixin_38736562
  1. 深入理解PHP中mt_rand()随机数的安全

  2. 前言 在前段时间挖了不少跟mt_rand()相关的安全漏洞,基本上都是错误理解随机数用法导致的。这里又要提一下php官网manual的一个坑,看下关于mt_rand()的介绍:中文版^cn 英文版^en,可以看到英文版多了一块黄色的 Caution 警告 This function does not generate cryptographically secure values, and should not be used for cryptographic purposes. If yo
  3. 所属分类:其它

    • 发布日期:2021-01-20
    • 文件大小:91136
    • 提供者:weixin_38632624
  1. nrf util.pdf

  2. The nRF Util application is a Python package and command-line utility that supports Device Firmware Update (DFU) and cryptographic functionality. The nRF Util application and its library has the following features: • DFU package generation • Cryptogr
  3. 所属分类:互联网

« 1 2 ... 9 10 11 12 13 14»