无所不知 发表于 2025-3-23 12:17:36

http://reply.papertrans.cn/15/1476/147591/147591_11.png

dithiolethione 发表于 2025-3-23 15:55:30

Cryptographic protocols based on real-quadratic A-fields (extended abstract),978-94-009-6251-4

随意 发表于 2025-3-23 21:47:04

Hash functions based on block ciphers and quaternary codes,978-0-230-61170-2

antedate 发表于 2025-3-24 00:04:56

http://reply.papertrans.cn/15/1476/147591/147591_14.png

Insatiable 发表于 2025-3-24 03:35:34

Some remarks on a receipt-free and universally verifiable Mix-type voting scheme,978-981-13-1138-3

Melatonin 发表于 2025-3-24 07:01:16

Electronic money and key management from global and regional points of view,978-0-230-28153-0

乞丐 发表于 2025-3-24 14:36:59

Limiting the visible space visual secret sharing schemes and their application to human identificat978-0-333-97798-9

Exhilarate 发表于 2025-3-24 18:31:25

http://reply.papertrans.cn/15/1476/147591/147591_18.png

Habituate 发表于 2025-3-24 22:43:00

https://doi.org/10.1007/978-3-319-89731-8mes. The reason why the Bleichenbacher-attack() works for ElGamal but not for DSA can be also explained well by the conception. We show that an elliptic curve gives the message recovery signature equivalent to DSA. Furthermore we investigate the new attack over elliptic curves and present its new

过去分词 发表于 2025-3-25 02:15:16

How to Select a Career in Oral Healthatic A-fields as another computationally difficult problem. In real-quadratic number fields this again is at least as difficult as the integer factorization problem. In congruence function fields the problem of computing square roots is supposed to be even more difficult than in number fields. We pr
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Advances in Cryptology - ASIACRYPT ‘96; International Confer Kwangjo Kim,Tsutomu Matsumoto Conference proceedings 1996 Springer-Verlag Berl