Jejunum 发表于 2025-3-21 17:57:58

书目名称Advances in Cryptology – EUROCRYPT ‘88影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0147620<br><br>        <br><br>书目名称Advances in Cryptology – EUROCRYPT ‘88影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0147620<br><br>        <br><br>书目名称Advances in Cryptology – EUROCRYPT ‘88网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0147620<br><br>        <br><br>书目名称Advances in Cryptology – EUROCRYPT ‘88网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0147620<br><br>        <br><br>书目名称Advances in Cryptology – EUROCRYPT ‘88被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0147620<br><br>        <br><br>书目名称Advances in Cryptology – EUROCRYPT ‘88被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0147620<br><br>        <br><br>书目名称Advances in Cryptology – EUROCRYPT ‘88年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0147620<br><br>        <br><br>书目名称Advances in Cryptology – EUROCRYPT ‘88年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0147620<br><br>        <br><br>书目名称Advances in Cryptology – EUROCRYPT ‘88读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0147620<br><br>        <br><br>书目名称Advances in Cryptology – EUROCRYPT ‘88读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0147620<br><br>        <br><br>

Maximize 发表于 2025-3-21 21:56:54

http://reply.papertrans.cn/15/1477/147620/147620_2.png

ORBIT 发表于 2025-3-22 03:34:49

Springer-Verlag Berlin Heidelberg 1988

是剥皮 发表于 2025-3-22 07:28:41

http://reply.papertrans.cn/15/1477/147620/147620_4.png

传染 发表于 2025-3-22 11:38:43

Cartographies of Becoming in EducationIn this paper we present a Fiat-Shamir like authentication protocol for the El-Gamal Scheme.

小虫 发表于 2025-3-22 14:31:14

http://reply.papertrans.cn/15/1477/147620/147620_6.png

额外的事 发表于 2025-3-22 18:44:54

Cartographies of Race and Social DifferenceElection protocols embodying robustness, verifiability of returns by voters, and unconditional security for voters’ privacy have been presented. The techniques also allow untraceable payments and credentials.

vasospasm 发表于 2025-3-23 00:55:15

http://reply.papertrans.cn/15/1477/147620/147620_8.png

惹人反感 发表于 2025-3-23 03:11:15

Frédéric Mallein-Gerin,Jérôme Gouttenoire public messages. They are based on n-fold composition of some suitable elementary function. The first protocol is shown to fail always when the elementary function is chosen to be linear. This does not preclude its use for a suitable nonlinear elementary function. The second protocol is shown to be

muscle-fibers 发表于 2025-3-23 07:01:10

Philippe Pastoureau,Agnès Chomelocols were shown for three configurations: a ring, a complete graph, and a star. Yacobi has made an impersonation attack on the protocols for the complete graph and star networks. This paper proposes improved identity-based key distribution protocols to counter his attack.
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Advances in Cryptology – EUROCRYPT ‘88; Workshop on the Theo D. Barstow,W. Brauer,Christoph G. Günther Conference proceedings 1988 Springer