搜索结果: 1-15 共查到“opening”相关记录94条 . 查询时间(0.078 秒)
Stomatal opening ratio mediates trait coordinating network adaptation to environmental gradients
Siberian elm (Ulmus pumila) covariation eurybiont guard cells maximum theoretical stomatal conductance (gsmax) stomatal water availability
2023/11/28
A trait coordination network is constructed through intercorrelations of functional traits, which reflect trait-based adaptive strategies. However, little is known about how these networks change acro...
Soybean Oil Modified Bio-based Poly(vinyl alcohol)s via Ring-Opening Polymerization
Biodegradable properties Epoxidized soybean oil Modification Poly(vinyl alcohol)
2019/11/11
In this paper, a simple method to modify the poly(vinyl alcohol) (PVA) through ring-opening reaction of epoxidized soybean oil (ESBO), catalyzed by hydrochloric acid is reported. The effect of ESBO lo...
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions
public key encryption receiver selective opening security chosen ciphertext security
2018/11/12
In the situation where there are one sender and multiple receivers, a receiver selective opening (RSO) attack for a public key encryption (PKE) scheme considers adversaries that can corrupt some of th...
Private Message Franking with After Opening Privacy
message franking protocols abusive reports messaging applications
2018/11/7
Recently Grubbs et al. [GLR17] initiated the formal study of message franking protocols. This new type of service launched by Facebook, allows the receiver in a secure messaging application to verifia...
People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes
message franking commitment encryption
2018/11/5
Message franking enables a receiver to report a potential abuse in a secure messaging system which employs an end to end encryption. Such mechanism is crucial for accountability and is already widely ...
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks
simulation-based security selective opening security for receivers chosen-ciphertext attacks
2018/8/21
Security against selective opening attack (SOA) for receivers requires that in a multi-user setting, even if an adversary has access to all ciphertexts, and adaptively corrupts some fraction of the us...
山东财经大学外国语学院英语写作IV课件 Opening lecture for the new term
山东财经大学外国语学院 英语写作IV 课件 Opening lecture for the new term
2018/7/9
山东财经大学外国语学院英语写作IV课件 Opening lecture for the new term。
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption
Identity-based encryption Key dependent message security Receiver selective opening security
2017/10/10
We construct two identity-based encryption (IBE) schemes. The first one is IBE satisfying key dependent message (KDM) security for user secret keys. The second one is IBE satisfying simulation-based r...
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE
LWE lossy trapdoor functions chosen-ciphertext security
2017/9/14
Selective opening (SO) security refers to adversaries that receive a number of ciphertexts and, after having corrupted a subset of the senders (thus obtaining the plaintexts and the senders' random co...
Selective Opening Security from Simulatable Data Encapsulation
selective opening hybrid encryption mode of operation
2016/12/10
The confidentiality notion of security against selective opening attacks considers adversaries
that obtain challenge ciphertexts and are allowed to adaptively open them, thereby revealing
the encryp...
Selective-Opening Security in the Presence of Randomness Failures
selective-opening security deterministic encryption nonce-based PKE
2016/12/9
We initiate the study of public-key encryption (PKE) secure against selective-opening attacks (SOA) in
the presence of randomness failures, i.e., when the sender may (inadvertently) use low-quality r...
Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks
receiver selective opening chosen ciphertext security hash proof system
2016/12/7
We present a general construction of RSO security against chosen ciphertext attacks (RSO-CCA) by combining any RSO secure scheme against chosen plaintext attacks (RSO-CPA) with any regular CCA secure ...
Scripps Florida Scientists Predict Cell Changes that Affect Breast Cancer Growth,Opening Door to More Effective Therapies
Scripps Florida Scientists Cell Changes Breast Cancer Growth More Effective Therapies
2016/4/28
Designing effective new drugs, especially drugs to fight cancer, demands that you know as much as you can about the molecular workings of cancer growth. Without that, it’s like planning to fight a war...
On the Selective Opening Security of Practical Public-Key Encryption Schemes
public key encryption selective opening security SIM-SO-CCA
2016/4/6
We show that two well-known and widely employed public-key encryption schemes – RSA Optimal
Asymmetric Encryption Padding (RSA-OAEP) and Diffie-Hellman Integrated Encryption Scheme
(DHIES), instanti...
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Public-key encryption selective-opening security lossy encryption
2016/2/24
In a selective-opening (SO) attack on an encryption scheme, an adversary A gets a number of ciphertexts (with possibly related plain- texts), and can then adaptively select a subset of those ciphertex...