有权 发表于 2025-3-25 03:57:32
http://reply.papertrans.cn/17/1617/161619/161619_21.png清澈 发表于 2025-3-25 08:12:35
http://reply.papertrans.cn/17/1617/161619/161619_22.png门窗的侧柱 发表于 2025-3-25 13:40:31
Çetin Kaya Koç,Sihem Mesnager,Erkay SavaşIncludes supplementary material:BOOM 发表于 2025-3-25 19:10:26
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/b/image/161619.jpgFECK 发表于 2025-3-25 23:03:14
https://doi.org/10.1007/978-3-319-16277-5Algebraic Curves; Bent Function; Boolean Function; Code-based Cryptography; Cryptography; Elliptic Curve;委屈 发表于 2025-3-26 04:03:32
978-3-319-16276-8Springer International Publishing Switzerland 2015Juvenile 发表于 2025-3-26 06:31:58
Computing Discrete Logarithms in , and , Using Magmainite field . with very modest computational resources. Our . implementation was the first to illustrate the effectiveness of Joux’s algorithm for computing discrete logarithms in small-characteristic finite fields that are not Kummer or twisted-Kummer extensions.一个姐姐 发表于 2025-3-26 11:01:10
http://reply.papertrans.cn/17/1617/161619/161619_28.pngSOBER 发表于 2025-3-26 15:47:13
Quadratic Residue Codes over , codes of length . over . quadratic residue codes over . are defined by their generating idempotents and their extension codes are discussed. Examples of codes and idempotents for small values of . and . are given. As a by-product almost MDS codes over . and . are constructed.confederacy 发表于 2025-3-26 17:37:35
http://reply.papertrans.cn/17/1617/161619/161619_30.png