Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
MASCOT: faster malicious arithmetic secure computation with oblivious transfer
We consider the task of secure multi-party computation of arithmetic circuits over a finite
field. Unlike Boolean circuits, arithmetic circuits allow natural computations on integers to be …
field. Unlike Boolean circuits, arithmetic circuits allow natural computations on integers to be …
[KNIHA][B] Introduction to modern cryptography: principles and protocols
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
Detecting pedestrians using patterns of motion and appearance
Viola, Snow - … ninth IEEE international conference on computer …, 2003 - ieeexplore.ieee.org
This paper describes a pedestrian detection system that integrates image intensity
information with motion information. We use a detection style algorithm that scans a detector …
information with motion information. We use a detection style algorithm that scans a detector …
[PDF][PDF] Evaluation of Some Blockcipher Modes of Operation
P Rogaway - 2011 - cs.ucdavis.edu
1. Overview. This report analyzes the security of some 17 cryptographic modes of operation
described within some eight US or international standards. Most of the schemes are …
described within some eight US or international standards. Most of the schemes are …
Research on the security criteria of hash functions in the blockchain
M Wang, M Duan, J Zhu - Proceedings of the 2nd ACM Workshop on …, 2018 - dl.acm.org
The blockchain is an emerging technology. Because of its efficiency and functionality, it is
widely considered to have revolutionary application prospects. As a supporting part of the …
widely considered to have revolutionary application prospects. As a supporting part of the …
Tweakable blockciphers with beyond birthday-bound security
Abstract Liskov, Rivest and Wagner formalized the tweakable blockcipher (TBC) primitive at
CRYPTO'02. The typical recipe for instantiating a TBC is to start with a blockcipher, and then …
CRYPTO'02. The typical recipe for instantiating a TBC is to start with a blockcipher, and then …
The hash function BLAKE
This book is about the cryptographic hash function BLAKE, one of the five final contenders in
the SHA3 competition, out of 64 initial submissions. The SHA3 competition was a public …
the SHA3 competition, out of 64 initial submissions. The SHA3 competition was a public …
Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models
The random-permutation model (RPM) and the ideal-cipher model (ICM) are idealized
models that offer a simple and intuitive way to assess the conjectured standard-model …
models that offer a simple and intuitive way to assess the conjectured standard-model …
Simpira v2: A family of efficient permutations using the AES round function
This paper introduces Simpira, a family of cryptographic permutations that supports inputs of
128 * b bits, where b is a positive integer. Its design goal is to achieve high throughput on …
128 * b bits, where b is a positive integer. Its design goal is to achieve high throughput on …
Security Analysis of salt|| password Hashes
P Gauravaram - 2012 International Conference on Advanced …, 2012 - ieeexplore.ieee.org
Protection of passwords used to authenticate computer systems and networks is one of the
most important application of cryptographic hash functions. Due to the application of …
most important application of cryptographic hash functions. Due to the application of …