傀儡 发表于 2025-3-30 10:53:33

http://reply.papertrans.cn/15/1475/147464/147464_51.png

expdient 发表于 2025-3-30 14:16:47

http://reply.papertrans.cn/15/1475/147464/147464_52.png

Myofibrils 发表于 2025-3-30 18:59:58

http://reply.papertrans.cn/15/1475/147464/147464_53.png

放大 发表于 2025-3-30 21:26:53

http://reply.papertrans.cn/15/1475/147464/147464_54.png

saturated-fat 发表于 2025-3-31 03:21:46

0302-9743 A, USA in August 2009. The 38 revised full papers presented were carefully reviewed and selected from 213 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in to

BLAZE 发表于 2025-3-31 06:46:44

http://reply.papertrans.cn/15/1475/147464/147464_56.png

Metastasis 发表于 2025-3-31 11:05:19

Maria Morena PhD,Patrizia Campolongo PhDes. Our results, which employ Markov-chain techniques, enable the construction of a practical and provably-secure blockcipher-based scheme for deterministically enciphering credit card numbers and the like using a conventional blockcipher.

climax 发表于 2025-3-31 14:50:09

Maria Morena PhD,Patrizia Campolongo PhDn the binary Edwards curve .(. + . + . + .) = (. + .)(. + .) over the field . where . = . + . + . + 1. The paper’s field-arithmetic techniques can be applied in much more generality but have a particularly efficient interaction with the completeness of addition formulas for binary Edwards curves.

nonradioactive 发表于 2025-3-31 20:42:50

Conference proceedings 2009peration, elliptic curves, cryptographic hardness, merkle puzzles, cryptography in the physical world, attacks on signature schemes, secret sharing and secure computation, cryptography and game-theory, cryptography and lattices, identity-based encryption and cryptographers’ toolbox.

incredulity 发表于 2025-4-1 01:46:08

Canine Cognition and the Human Bonderiod: it can be made to require about 2. MD5 compression function calls. Finally, we improve the complexity of identical-prefix collisions for MD5 to about 2. MD5 compression function calls and use it to derive a practical single-block chosen-prefix collision construction of which an example is given.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Advances in Cryptology - CRYPTO 2009; 29th Annual Internat Shai Halevi Conference proceedings 2009 International Association for Cryptologi