咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 电气工程
    • 2 篇 计算机科学与技术...

主题

  • 2 篇 setup algorithm
  • 1 篇 transposition
  • 1 篇 forward secrecy
  • 1 篇 asymmetric group...
  • 1 篇 d k-hdhe assumpt...
  • 1 篇 permutation
  • 1 篇 cycle
  • 1 篇 cube-connected n...
  • 1 篇 dynamic authenti...
  • 1 篇 kcir
  • 1 篇 eurocrypt 2009
  • 1 篇 black-box tracin...
  • 1 篇 ind-cpa security
  • 1 篇 one-round dynami...
  • 1 篇 cryptographic pr...
  • 1 篇 join algorithm
  • 1 篇 leave algorithm
  • 1 篇 key compromise i...
  • 1 篇 dynamic asymmetr...
  • 1 篇 public traitor t...

机构

  • 1 篇 digital equipmen...
  • 1 篇 qingdao univ tec...

作者

  • 1 篇 oruc ay
  • 1 篇 mittal m
  • 1 篇 ma hongyang
  • 1 篇 teng jikai

语言

  • 2 篇 英文
检索条件"主题词=setup algorithm"
2 条 记 录,以下是1-10 订阅
排序:
Dynamic asymmetric group key agreement protocol with traitor traceability
收藏 引用
IET INFORMATION SECURITY 2019年 第6期13卷 703-710页
作者: Teng, Jikai Ma, Hongyang Qingdao Univ Technol Sch Sci Qingdao 266003 Shadong Peoples R China
In asymmetric group key agreement (ASGKA) protocols, a group of users establish a common encryption key which is publicly accessible and compute pairwise different decryption keys. It is left as an open problem to des... 详细信息
来源: 评论
setup algorithmS FOR CUBE-CONNECTED PARALLEL COMPUTERS USING RECURSIVE KARNAUGH MAPS
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 1991年 第2期40卷 217-221页
作者: ORUC, AY MITTAL, M DIGITAL EQUIPMENT CORP HUDSONMA 01748
This paper presents optimal setup procedures for cube-connected networks. The setup patterns include paths, transpositions, cycles, and one-pass permutations. For an N-input cube-connected network, the procedure for p... 详细信息
来源: 评论