freight 发表于 2025-3-28 15:13:15

Basics of Expert System Technology,we focused our efforts on efficient computation of primitive elements and modular roots. Our optimizations involve some heuristic methods that use “modular composition” and the generalized Tonelli-Shanks algorithm. Other open and free systems such as GP/Pari do not include in their standard packages

epidermis 发表于 2025-3-28 19:34:25

Recording, Evaluating and Testing Controlsted efficiently without using a pre-computational phase. We extend the set of moduli that is recommended by Standards for Efficient Cryptography (SEC) by defining two distinct sets for which either Barrett or Montgomery reduction is applicable. As the proposed algorithm is very suitable for a fast m

有偏见 发表于 2025-3-29 00:57:01

Recording, Evaluating and Testing Controlsch is known as the shifted polynomial basis, has been introduced. Current research shows that this new basis provides better performance in designing bit-parallel and subquadratic space complexity multipliers over binary extension fields. In this paper, we study digit-serial multiplication algorithm

共栖 发表于 2025-3-29 05:28:46

http://reply.papertrans.cn/17/1617/161620/161620_44.png

学术讨论会 发表于 2025-3-29 11:03:41

Dimitris N. Chorafas,Heinrich Steinmanneration, finite field inversion, power mappings and heuristic techniques. From these techniques, the use of finite field inversion in the construction of an S-box is so popular because it presents good cryptographic properties. On the other hand, while S-boxes such as AES, Shark, Square and Hierocry

精确 发表于 2025-3-29 15:20:46

http://reply.papertrans.cn/17/1617/161620/161620_46.png

外面 发表于 2025-3-29 19:24:30

http://reply.papertrans.cn/17/1617/161620/161620_47.png

亚麻制品 发表于 2025-3-29 19:51:48

Rin-ichiro Taniguchi,Eiji Kawaguchiest field size for which linear network coding is feasible. Second we derive improved estimates on the success probability of random linear network coding. These estimates take into account which monomials occur in the support of the determinant of the product of Edmonds matrices. Therefore we final

Inoperable 发表于 2025-3-30 02:28:24

http://reply.papertrans.cn/17/1617/161620/161620_49.png

falsehood 发表于 2025-3-30 07:12:44

Expert Systems in Engineering Applications that takes . binary inputs whose image is a binary .-tuple; therefore it is represented as .. One of the most important cryptographic applications is the case . = ., thus the S-box may be viewed as a function over .. We show that certain classes of functions over . do not possess a cryptographic pr
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Arithmetic of Finite Fields; Second International Joachim Gathen,José Luis Imaña,Çetin Kaya Koç Conference proceedings 2008 Springer-Verlag