| Document Date: 2013-12-30 04:23:42 Open Document File Size: 459,14 KBShare Result on Facebook
Country China / / / Facility South China University of Technology / / IndustryTerm search attack / generation algorithm / proxy signature protocol / probabilistic algorithm / verification algorithm / exhaustive search algorithm needs / hybrid attack algorithm / oil variables / exhaustive search algorithm / multivariate systems / exhaustive search attack algorithm / exhaustive search attack / linear systems / oil subspace / / Organization Xiaoyu Li4 School of Computer Science & Engineering / South China University of Technology / Guangzhou / / Person Shaohua Tang / / Position Models Security model for signature / MP / Private / Corresponding author / Security model for proxy signature / / Region South China / / Technology so-called hybrid attack algorithm / cryptography / key generation algorithm / public key / inverting algorithm / exhaustive search algorithm / signing algorithm / verification algorithm / private key / secret key / exhaustive search attack algorithm / proxy signature protocol / key-generation algorithm / probabilistic algorithm / /
SocialTag |