PRE 发表于 2025-4-1 05:04:03

http://reply.papertrans.cn/24/2325/232439/232439_61.png

Presbycusis 发表于 2025-4-1 07:31:42

http://reply.papertrans.cn/24/2325/232439/232439_62.png

健谈的人 发表于 2025-4-1 13:50:30

Design of a New Kind of Encryption Kernel Based on RSA Algorithm hardware realization to actualize the RSA algorithm is proposed. This ameliorative algorithm avoids multiplication operation, which is easier for hardware realization. In the decryption and digital signature process, a combination of this ameliorative Montgomery algorithm and the Chinese remainder

易受骗 发表于 2025-4-1 15:46:04

On the Security of Condorcet Electronic Voting Schemee result of the election is determined by one-on-one comparisons between each candidate. We propose the Condorcet electronic voting scheme that is secure, universally verifiable and satisfying one-on-one comparison privacy. Furthermore the result of the election can be determined without revealing t

minimal 发表于 2025-4-1 20:17:31

http://reply.papertrans.cn/24/2325/232439/232439_65.png

TOM 发表于 2025-4-2 01:21:21

http://reply.papertrans.cn/24/2325/232439/232439_66.png

有危险 发表于 2025-4-2 03:47:25

http://reply.papertrans.cn/24/2325/232439/232439_67.png

Acquired 发表于 2025-4-2 07:13:33

http://reply.papertrans.cn/24/2325/232439/232439_68.png
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Computational Intelligence and Security; International Confer Yue Hao,Jiming Liu,Yong-Chang Jiao Conference proceedings 2005 Springer-Verla