不溶解 发表于 2025-3-30 08:51:04

http://reply.papertrans.cn/24/2326/232535/232535_51.png

认为 发表于 2025-3-30 16:15:47

http://reply.papertrans.cn/24/2326/232535/232535_52.png

wreathe 发表于 2025-3-30 17:33:21

http://reply.papertrans.cn/24/2326/232535/232535_53.png

GEAR 发表于 2025-3-30 23:04:51

http://reply.papertrans.cn/24/2326/232535/232535_54.png

地壳 发表于 2025-3-31 02:55:46

http://reply.papertrans.cn/24/2326/232535/232535_55.png

起波澜 发表于 2025-3-31 05:26:04

http://reply.papertrans.cn/24/2326/232535/232535_56.png

Modicum 发表于 2025-3-31 11:10:42

0302-9743 national Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-conference on Artificial and Natural Neural Networks.The 38 revised full papers presented were caref

揉杂 发表于 2025-3-31 17:14:15

http://reply.papertrans.cn/24/2326/232535/232535_58.png

Hemodialysis 发表于 2025-3-31 19:04:24

https://doi.org/10.1007/978-3-8350-9137-5em (SDLP) and on the Integer Factorization Problem (IFP). The scheme can be carried out in an on- and off-line basis, is efficient, and the bitlength of the multisignature does not depend on the number of signers.

FLAIL 发表于 2025-4-1 00:05:04

Structural Properties of Cryptographic Sequenceshe previous sequences can be analyzed in terms of linear equation solutions. In brief, computing the solutions of linear difference equations is an easy method of generating new sequences with guaranteed cryptographic parameters.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Computational Intelligence in Security for Information Systems; 4th International Co Álvaro Herrero,Emilio Corchado Conference proceedings