浪荡子 发表于 2025-3-28 15:52:27

The Weight Distribution for an Extended Family of Reducible Cyclic Codesr contribution improves the sufficient numerical conditions that determine the weight distribution for the class of reducible cyclic codes that were studied in [.] and in [.]. Furthermore, as will be shown later, a conclusion here will be that thanks to these previous works and the present contribut

带来的感觉 发表于 2025-3-28 19:17:54

http://reply.papertrans.cn/23/2289/228847/228847_42.png

ARM 发表于 2025-3-29 01:34:05

Spectral Approach for Correlation Power Analysisconsumption measures on a device running a cryptographic algorithm with a CMOS technology based circuitry. Unlike most of CPA attacks that are based on statistical attacks, this paper proposes a new approach based on spectral analysis. The interest lies in the reduction of the attack complexity. The

脱落 发表于 2025-3-29 06:53:43

Efficient Implementation of Hybrid Encryption from Coding Theoryeve IND-CCA2 security (in the random oracle model), we use an HMAC function of the message and the symmetric key, and then apply AES128-CBC as the data encapsulation part of this hybrid scheme. The HMAC function is based on SHA3-512. In addition, we introduce a modification in the decapsulation algo

过多 发表于 2025-3-29 10:42:01

http://reply.papertrans.cn/23/2289/228847/228847_45.png

兵团 发表于 2025-3-29 15:25:37

978-3-319-55588-1Springer International Publishing AG 2017

暂时休息 发表于 2025-3-29 16:38:11

Said El Hajji,Abderrahmane Nitaj,El Mamoun SouidiIncludes supplementary material:

来这真柔软 发表于 2025-3-29 23:17:41

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/228847.jpg

Defraud 发表于 2025-3-30 03:01:10

Md Shahab Uddin,Mohammad Mannan,Amr YoussefIn this paper, we determine the Walsh spectra of three classes of quadratic APN functions and we prove that the class of quadratic trinomial APN functions constructed by Göloğlu is affine equivalent to Gold functions.

注射器 发表于 2025-3-30 04:20:27

http://reply.papertrans.cn/23/2289/228847/228847_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Codes, Cryptology and Information Security; Second International Said El Hajji,Abderrahmane Nitaj,El Mamoun Souidi Conference proceedings 2