Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On Multiple Encryption for Public-Key Cryptography
T Soroceanu, N Buchmann, M Margraf - Cryptography, 2023 - mdpi.com
Using multiple, individual encryption schemes is a well-established method to increase the
overall security of encrypted data. These so-called multiple encryption or hybrid schemes …
overall security of encrypted data. These so-called multiple encryption or hybrid schemes …
Efficient secret sharing schemes achieving optimal information rate
Y Wang, Y Desmedt - 2014 IEEE Information Theory Workshop …, 2014 - ieeexplore.ieee.org
One of the important problems in secret sharing schemes is to establish bounds on the size
of the shares to be given to participants in secret sharing schemes. The other important …
of the shares to be given to participants in secret sharing schemes. The other important …
Efficient, XOR-based, ideal threshold schemes
We propose a new, lightweight (t, n)-threshold secret sharing scheme that can be
implemented using only XOR operations. Our scheme is based on an idea extracted from a …
implemented using only XOR operations. Our scheme is based on an idea extracted from a …
Adding features of educational games for teaching Physics
Virtual laboratories (VLs) have to overcome important challenges to improve student
knowledge, understanding and motivation. This research aims to test the hypothesis that …
knowledge, understanding and motivation. This research aims to test the hypothesis that …
Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains
Recently, a secret sharing scheme is found to be effective to solve the key distribution
problem between parties in RFID-enabled supply chains. However, there is a problem that …
problem between parties in RFID-enabled supply chains. However, there is a problem that …
Cryptanalysis and improvement of a group RFID authentication protocol
In recent years, radio frequency identification (RFID) systems have become popular for
identification. The key technology to protect the security of RFID systems is mutual …
identification. The key technology to protect the security of RFID systems is mutual …
New proof techniques using the properties of circulant matrices for XOR-based (k, n) threshold secret sharing schemes
K Shima, H Doi - Journal of Information Processing, 2021 - jstage.jst.go.jp
Several secret sharing schemes with low computational costs have been proposed. XOR-
based secret sharing schemes have been reported to be a part of such low-cost schemes …
based secret sharing schemes have been reported to be a part of such low-cost schemes …
A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function
The applications of using multi-tag RFID technology have rapidly grown to be used in
different fields of life. However, security and privacy are the main issues with this technology …
different fields of life. However, security and privacy are the main issues with this technology …
A Quorum System for Distributing RFID Tags
Recently, the applications of radio frequency identification (RFID) technology have been
increasingly used in various fields that need automatic identification. RFID is an alternative …
increasingly used in various fields that need automatic identification. RFID is an alternative …
Practical key distribution scheme with less dummy tags in RFID-enabled supply chains
In RFID-enabled supply chains, in order to securely deliver products, a secret sharing
scheme has been proposed. An encryption key of tags is split into shares and the key can be …
scheme has been proposed. An encryption key of tags is split into shares and the key can be …