Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Satellite-based communications security: A survey of threats, solutions, and research challenges
Satellite-based Communication (SATCOM) systems are gaining renewed momentum in
Industry and Academia, thanks to innovative services introduced by leading tech companies …
Industry and Academia, thanks to innovative services introduced by leading tech companies …
The role of the adversary model in applied security research
Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …
schemes or protocols. However, their use in other computer science research disciplines is …
A formal security analysis of the signal messaging protocol
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …
Post-quantum TLS without handshake signatures
We present KEMTLS, an alternative to the TLS 1.3 handshake that uses key-encapsulation
mechanisms (KEMs) instead of signatures for server authentication. Among existing post …
mechanisms (KEMs) instead of signatures for server authentication. Among existing post …
Asymptotically optimal validated asynchronous byzantine agreement
We provide a new protocol for Validated Asynchronous Byzantine Agreement in the
authenticated setting. Validated (multi-valued) Asynchronous Byzantine Agreement is a key …
authenticated setting. Validated (multi-valued) Asynchronous Byzantine Agreement is a key …
A secure biometrics-based multi-server authentication protocol using smart cards
Recently, in 2014, He and Wang proposed a robust and efficient multi-server authentication
scheme using biometrics-based smart card and elliptic curve cryptography (ECC). In this …
scheme using biometrics-based smart card and elliptic curve cryptography (ECC). In this …
Lattice cryptography for the internet
C Peikert - International workshop on post-quantum cryptography, 2014 - Springer
In recent years, lattice-based cryptography has been recognized for its many attractive
properties, such as strong provable security guarantees and apparent resistance to quantum …
properties, such as strong provable security guarantees and apparent resistance to quantum …
[SÁCH][B] Foundations of cryptography: volume 2, basic applications
O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …
computing systems that address security concerns. The design of cryptographic systems …
Universally composable security: A new paradigm for cryptographic protocols
R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …
universally composable security. The salient property of universally composable definitions …
The elliptic curve digital signature algorithm (ECDSA)
D Johnson, A Menezes, S Vanstone - International journal of information …, 2001 - Springer
Abstract The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …