无所不知
发表于 2025-3-23 12:17:36
http://reply.papertrans.cn/15/1476/147591/147591_11.png
dithiolethione
发表于 2025-3-23 15:55:30
Cryptographic protocols based on real-quadratic A-fields (extended abstract),978-94-009-6251-4
随意
发表于 2025-3-23 21:47:04
Hash functions based on block ciphers and quaternary codes,978-0-230-61170-2
antedate
发表于 2025-3-24 00:04:56
http://reply.papertrans.cn/15/1476/147591/147591_14.png
Insatiable
发表于 2025-3-24 03:35:34
Some remarks on a receipt-free and universally verifiable Mix-type voting scheme,978-981-13-1138-3
Melatonin
发表于 2025-3-24 07:01:16
Electronic money and key management from global and regional points of view,978-0-230-28153-0
乞丐
发表于 2025-3-24 14:36:59
Limiting the visible space visual secret sharing schemes and their application to human identificat978-0-333-97798-9
Exhilarate
发表于 2025-3-24 18:31:25
http://reply.papertrans.cn/15/1476/147591/147591_18.png
Habituate
发表于 2025-3-24 22:43:00
https://doi.org/10.1007/978-3-319-89731-8mes. The reason why the Bleichenbacher-attack() works for ElGamal but not for DSA can be also explained well by the conception. We show that an elliptic curve gives the message recovery signature equivalent to DSA. Furthermore we investigate the new attack over elliptic curves and present its new
过去分词
发表于 2025-3-25 02:15:16
How to Select a Career in Oral Healthatic A-fields as another computationally difficult problem. In real-quadratic number fields this again is at least as difficult as the integer factorization problem. In congruence function fields the problem of computing square roots is supposed to be even more difficult than in number fields. We pr