Mawkish 发表于 2025-3-30 08:51:23

https://doi.org/10.1007/978-3-030-67742-8r finite fields. This paper presents the results of implementations of several linear algebra algorithms. It shows that very large sparse systems can be solved efficiently by using combinations of structured Gaussian elimination and the conjugate gradient, Lanczos, and Wiedemann methods.

absolve 发表于 2025-3-30 12:40:32

Amit Agarwal,Ranil Fernando,Roma Pradhanlass group of imaginary quadratic orders. Subsequently, in [.] and [.] a subexponential algorithm for computing those class groups was presented and it was shown how to use this algorithm and the index-calculus method to calculate discrete logarithms.

Opponent 发表于 2025-3-30 20:30:45

http://reply.papertrans.cn/15/1477/147634/147634_53.png

indubitable 发表于 2025-3-30 21:44:49

Anne Fleur van Veenstra,Tijs van den Broekavesdroppers relay questions and answers or in which the prover helps deliberately an impersonator have been described [.]. In this paper a solution against such frauds is given and (based on some physical assumptions) it is proved that the solution protects against the real-time attacks.

刺激 发表于 2025-3-31 02:31:54

http://reply.papertrans.cn/15/1477/147634/147634_55.png

立即 发表于 2025-3-31 06:05:37

AC, Splice, and Mechanical Losses,00 pairs of 64 bit plaintext blocks. The difference (bitwise xor) between the two blocks of each pair is equal to an appropriately selected constant. We first state that some differential statistics for intermediate values of the data randomizer are non uniform and independent of the encryption key.

有节制 发表于 2025-3-31 12:45:20

Introduction-Who Should Use this Book,esult much later [.]). One of his ideas was that it would be possible to use a stream of polarized photons to transmit two messages in a way that would make only one of them readable at the receiver’s choosing. This notion, which he called “multiplexing”, is remarkably similar to the “one-out-of-two

Incommensurate 发表于 2025-3-31 15:43:39

Introduction-Who Should Use this Book,.-party protocol for a function of . bits is efficient if it uses a constant number of rounds of communication and a total number of message bits that is polynomial in max(.). We show that . function has an efficient protocol that achieves (. log .)/. resilience, Ours is the first secure multiparty

cumber 发表于 2025-3-31 20:54:58

Fate Decisions of CD4+ T Cells,atural and powerful primitive for the implementation of bit commitment schemes. It is a generalization of the one-way group homomorphism [.], which was not powerful enough to capture the bit commitment scheme based on graph isomorphism [.]. It provides a unified theory for all the known bit commitme

brother 发表于 2025-4-1 00:00:05

http://reply.papertrans.cn/15/1477/147634/147634_60.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Advances in Cryptology - CRYPTO ‘90; Proceedings Alfred J. Menezes,Scott A. Vanstone Conference proceedings 1991 Springer-Verlag Berlin Hei