表示问 发表于 2025-3-30 08:36:36
http://reply.papertrans.cn/24/2325/232439/232439_51.png仔细阅读 发表于 2025-3-30 14:17:15
http://reply.papertrans.cn/24/2325/232439/232439_52.png亲密 发表于 2025-3-30 18:46:31
http://reply.papertrans.cn/24/2325/232439/232439_53.pngGanglion 发表于 2025-3-30 20:56:52
http://reply.papertrans.cn/24/2325/232439/232439_54.pngBILE 发表于 2025-3-31 03:14:54
Cryptanalysis of a Cellular Automata CryptosystemIn this paper we show that the new Cellular Automata Cryptosystem (CAC) is insecure and can be broken by chosen-plaintexts attack with little computation. We also restore the omitted parts clearly by deriving the rotating number . of plaintext bytes and the procedure of Major CA. The clock circle Δ of Major CA and the key S. are also attacked.富饶 发表于 2025-3-31 05:32:55
Stability of the Linear Complexity of the Generalized Self-shrinking SequencesThe stability of the linear complexity of the generalized self-shrinking sequences over GF(2) with period .=2. is investigated. The main results follow: The linear complexity of the periodic sequences obtained by either deleting or inserting one symbol within one period are discussed, and the explicit values for the linear complexity are given.MORT 发表于 2025-3-31 09:49:28
http://reply.papertrans.cn/24/2325/232439/232439_57.png笨重 发表于 2025-3-31 14:25:44
https://doi.org/10.1007/11596981Bayesian networks; Fuzzy; architecture; cognition; computational intelligence; cryptographic protocols; da粗鄙的人 发表于 2025-3-31 20:48:24
http://reply.papertrans.cn/24/2325/232439/232439_59.png合唱队 发表于 2025-3-31 22:38:50
A Fast Inversion Algorithm and Low-Complexity Architecture over ,(2,)finite field, the multiplicative inversion is the most time consuming operation. In this paper, a fast inversion algorithm over .(2.) with the polynomial basis representation is proposed. The proposed algorithm executes in about 27.5% or 45.6% less iterations than the extended binary gcd algorithm (