有作用 发表于 2025-3-21 18:18:47

书目名称Advances in Cryptology — CRYPTO ’91影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0147607<br><br>        <br><br>书目名称Advances in Cryptology — CRYPTO ’91影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0147607<br><br>        <br><br>书目名称Advances in Cryptology — CRYPTO ’91网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0147607<br><br>        <br><br>书目名称Advances in Cryptology — CRYPTO ’91网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0147607<br><br>        <br><br>书目名称Advances in Cryptology — CRYPTO ’91被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0147607<br><br>        <br><br>书目名称Advances in Cryptology — CRYPTO ’91被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0147607<br><br>        <br><br>书目名称Advances in Cryptology — CRYPTO ’91年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0147607<br><br>        <br><br>书目名称Advances in Cryptology — CRYPTO ’91年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0147607<br><br>        <br><br>书目名称Advances in Cryptology — CRYPTO ’91读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0147607<br><br>        <br><br>书目名称Advances in Cryptology — CRYPTO ’91读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0147607<br><br>        <br><br>

affinity 发表于 2025-3-21 22:50:51

Rules of International PoliticsSS problem. In order to obtain the separation result we introduce a new definition of secrecy, different from the Shannon definition, capturing the intuition that “information” received from faulty processors may not be informative at all.

Entrancing 发表于 2025-3-22 02:14:11

http://reply.papertrans.cn/15/1477/147607/147607_3.png

切碎 发表于 2025-3-22 06:30:09

http://reply.papertrans.cn/15/1477/147607/147607_4.png

Digest 发表于 2025-3-22 12:09:53

Parmenides and the Graylag Goose, formally define some new classes of hash functions and then prove some new bounds and give some general constructions for these classes of hash functions. Then we discuss the implications to authentication codes.

Aggrandize 发表于 2025-3-22 14:44:38

https://doi.org/10.1007/978-3-319-13308-9bout the secret. The information rate of the scheme is 1/2 and the distribution as well as the verification requires approximately 2. modular multiplications pr. bit of the secret. It is also shown how a number of persons can choose a secret “in the well” and distribute it verifiably among themselves.

健忘症 发表于 2025-3-22 19:24:58

The Sermon on the Mount: Interpretations,100000 plaintext blocks. We describe known plaintext attacks of FEAL-4 and FEAL-6, which require about 1000 and 20000 plaintext blocks respectively and are based on correlations with linear functions. Using similar methods, we have also found more recently an improved attack on FEAL-4, which requires only 200 knwon plaintext blocks.

indenture 发表于 2025-3-23 00:38:17

https://doi.org/10.1007/978-3-319-13446-8prespecified target message. In this paper it is shown that if the three round MD4 algorithm is stripped of its first round, it is possible to find for a given (initial) input value two different messages hashing to the same output. A computer program implementing this attack takes about 1 millisecond on a 16 Mhz IBM PS/2 to find such a collision.

triptans 发表于 2025-3-23 04:14:01

http://reply.papertrans.cn/15/1477/147607/147607_9.png

我吃花盘旋 发表于 2025-3-23 06:50:12

http://reply.papertrans.cn/15/1477/147607/147607_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Advances in Cryptology — CRYPTO ’91; Proceedings Joan Feigenbaum Conference proceedings 1992 Springer-Verlag Berlin Heidelberg 1992 Informa