malignant 发表于 2025-3-21 16:12:02

书目名称Computational Intelligence and Security影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0232439<br><br>        <br><br>书目名称Computational Intelligence and Security影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0232439<br><br>        <br><br>书目名称Computational Intelligence and Security网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0232439<br><br>        <br><br>书目名称Computational Intelligence and Security网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0232439<br><br>        <br><br>书目名称Computational Intelligence and Security被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0232439<br><br>        <br><br>书目名称Computational Intelligence and Security被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0232439<br><br>        <br><br>书目名称Computational Intelligence and Security年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0232439<br><br>        <br><br>书目名称Computational Intelligence and Security年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0232439<br><br>        <br><br>书目名称Computational Intelligence and Security读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0232439<br><br>        <br><br>书目名称Computational Intelligence and Security读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0232439<br><br>        <br><br>

哀悼 发表于 2025-3-21 21:14:10

https://doi.org/10.1007/978-3-642-41237-0 linear recurring length is always equal to the half of the length of the given sequence. The probability of finding the distribution of the shortest linear recurring length of two sequences in . / (.) field is also given.

PHAG 发表于 2025-3-22 00:30:49

https://doi.org/10.1007/978-3-658-35515-9ns to construct polynomials over the intermediate extension field between .. and .. denoted by .. where . divides .. It turns out that many codes with the best parameters can be obtained by our construction and improve the parameters of Brouwer’s table . Some codes we get are optimal by the Griesmer bound.

推迟 发表于 2025-3-22 05:27:16

http://reply.papertrans.cn/24/2325/232439/232439_4.png

偶然 发表于 2025-3-22 10:08:23

http://reply.papertrans.cn/24/2325/232439/232439_5.png

Definitive 发表于 2025-3-22 14:42:28

http://reply.papertrans.cn/24/2325/232439/232439_6.png

Definitive 发表于 2025-3-22 20:17:18

http://reply.papertrans.cn/24/2325/232439/232439_7.png

缝纫 发表于 2025-3-22 23:11:55

http://reply.papertrans.cn/24/2325/232439/232439_8.png

semiskilled 发表于 2025-3-23 02:13:04

http://reply.papertrans.cn/24/2325/232439/232439_9.png

侵害 发表于 2025-3-23 09:04:38

Design of a New Kind of Encryption Kernel Based on RSA Algorithmtheorem is applied, which could quadruple the speed of the decryption and digital signature compared to the encryption. Furthermore, a new hardware model of the encryption kernel based on the ameliorative Montgomery is founded whose correctness and feasibility is validated by Verilog HDL in practice.
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Computational Intelligence and Security; International Confer Yue Hao,Jiming Liu,Yong-Chang Jiao Conference proceedings 2005 Springer-Verla