搜索结果: 1-3 共查到“军事学 Theory and Application”相关记录3条 . 查询时间(0.109 秒)
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited
one-way functions zero knowledge proof computational independence
2019/4/1
We introduce the concept of computationally independent pair of one-way functions (CI-OWF). We also provide two rich classes of examples of such functions based on standard assumptions. We revisit two...
A Humble Theory and Application for Logic Encryption
logic encryption obfuscation SAT attack
2017/7/24
Logic encryption is an important hardware security technique that introduces keys to modify a given combinational circuit in order to lock the functionality from unauthorized uses. Traditional methods...
The 14th Annual International Conference on the Theory and Application of Cryptology & Information Security(图)
Cryptology Information Security 14th Theory and Application
2008/5/14
December 7 - 11, 2008 Melbourne, Australia
The International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT, is the main annual event organised by Asi...