我要黑暗 发表于 2025-3-21 18:06:34

书目名称Codes, Cryptology and Information Security影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0228847<br><br>        <br><br>书目名称Codes, Cryptology and Information Security影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0228847<br><br>        <br><br>书目名称Codes, Cryptology and Information Security网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0228847<br><br>        <br><br>书目名称Codes, Cryptology and Information Security网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0228847<br><br>        <br><br>书目名称Codes, Cryptology and Information Security被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0228847<br><br>        <br><br>书目名称Codes, Cryptology and Information Security被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0228847<br><br>        <br><br>书目名称Codes, Cryptology and Information Security年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0228847<br><br>        <br><br>书目名称Codes, Cryptology and Information Security年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0228847<br><br>        <br><br>书目名称Codes, Cryptology and Information Security读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0228847<br><br>        <br><br>书目名称Codes, Cryptology and Information Security读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0228847<br><br>        <br><br>

季雨 发表于 2025-3-22 00:15:12

http://reply.papertrans.cn/23/2289/228847/228847_2.png

外露 发表于 2025-3-22 00:34:13

http://reply.papertrans.cn/23/2289/228847/228847_3.png

instate 发表于 2025-3-22 08:37:05

0302-9743 mation Security, C2SI 2017, held in Rabat, Morocco, in April 2017. .The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 72 submissions. The first aim of this conference is to pay homage to Claude Carlet for his valuable contribution in teaching and

过份 发表于 2025-3-22 10:12:48

http://reply.papertrans.cn/23/2289/228847/228847_5.png

分发 发表于 2025-3-22 15:28:09

http://reply.papertrans.cn/23/2289/228847/228847_6.png

分发 发表于 2025-3-22 21:07:14

Kun Li,Huachun Zhou,Zhe Tu,Bohao Fenglso some arguments to show why this problem seems much harder to solve in practice than the Equivalence Punctured Code problem or the Punctured Code problem proposed by . [.]. For one application of this problem we propose an improvement of the three-pass identification scheme of Girault and discuss on its performance.

right-atrium 发表于 2025-3-23 00:54:17

http://reply.papertrans.cn/23/2289/228847/228847_8.png

预感 发表于 2025-3-23 01:37:08

http://reply.papertrans.cn/23/2289/228847/228847_9.png

Medley 发表于 2025-3-23 08:45:08

A NP-Complete Problem in Coding Theory with Application to Code Based Cryptographylso some arguments to show why this problem seems much harder to solve in practice than the Equivalence Punctured Code problem or the Punctured Code problem proposed by . [.]. For one application of this problem we propose an improvement of the three-pass identification scheme of Girault and discuss on its performance.
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Codes, Cryptology and Information Security; Second International Said El Hajji,Abderrahmane Nitaj,El Mamoun Souidi Conference proceedings 2