无所不知 发表于 2025-3-23 12:17:36
http://reply.papertrans.cn/15/1476/147591/147591_11.pngdithiolethione 发表于 2025-3-23 15:55:30
Cryptographic protocols based on real-quadratic A-fields (extended abstract),978-94-009-6251-4随意 发表于 2025-3-23 21:47:04
Hash functions based on block ciphers and quaternary codes,978-0-230-61170-2antedate 发表于 2025-3-24 00:04:56
http://reply.papertrans.cn/15/1476/147591/147591_14.pngInsatiable 发表于 2025-3-24 03:35:34
Some remarks on a receipt-free and universally verifiable Mix-type voting scheme,978-981-13-1138-3Melatonin 发表于 2025-3-24 07:01:16
Electronic money and key management from global and regional points of view,978-0-230-28153-0乞丐 发表于 2025-3-24 14:36:59
Limiting the visible space visual secret sharing schemes and their application to human identificat978-0-333-97798-9Exhilarate 发表于 2025-3-24 18:31:25
http://reply.papertrans.cn/15/1476/147591/147591_18.pngHabituate 发表于 2025-3-24 22:43:00
https://doi.org/10.1007/978-3-319-89731-8mes. The reason why the Bleichenbacher-attack() works for ElGamal but not for DSA can be also explained well by the conception. We show that an elliptic curve gives the message recovery signature equivalent to DSA. Furthermore we investigate the new attack over elliptic curves and present its new过去分词 发表于 2025-3-25 02:15:16
How to Select a Career in Oral Healthatic A-fields as another computationally difficult problem. In real-quadratic number fields this again is at least as difficult as the integer factorization problem. In congruence function fields the problem of computing square roots is supposed to be even more difficult than in number fields. We pr