Malicious 发表于 2025-3-21 16:31:53

书目名称Cryptography and Coding影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0240563<br><br>        <br><br>书目名称Cryptography and Coding影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0240563<br><br>        <br><br>书目名称Cryptography and Coding网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0240563<br><br>        <br><br>书目名称Cryptography and Coding网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0240563<br><br>        <br><br>书目名称Cryptography and Coding被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0240563<br><br>        <br><br>书目名称Cryptography and Coding被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0240563<br><br>        <br><br>书目名称Cryptography and Coding年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0240563<br><br>        <br><br>书目名称Cryptography and Coding年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0240563<br><br>        <br><br>书目名称Cryptography and Coding读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0240563<br><br>        <br><br>书目名称Cryptography and Coding读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0240563<br><br>        <br><br>

Seminar 发表于 2025-3-21 23:30:12

How to Forge a Time-Stamp Which Adobe’s Acrobat Accepts presented in CRYPTO 2006. Since the original attack is not able to forge with these parameters, we used an extended attack described in this paper. Numerical examples of the forged signatures and times-stamp are also provided.

钩针织物 发表于 2025-3-22 00:52:04

http://reply.papertrans.cn/25/2406/240563/240563_3.png

散布 发表于 2025-3-22 04:49:47

Peng Zhao presented in CRYPTO 2006. Since the original attack is not able to forge with these parameters, we used an extended attack described in this paper. Numerical examples of the forged signatures and times-stamp are also provided.

avulsion 发表于 2025-3-22 09:09:53

http://reply.papertrans.cn/25/2406/240563/240563_5.png

影响深远 发表于 2025-3-22 13:03:15

Cryptography and Coding978-3-540-77272-9Series ISSN 0302-9743 Series E-ISSN 1611-3349

影响深远 发表于 2025-3-22 18:47:53

http://reply.papertrans.cn/25/2406/240563/240563_7.png

Parallel 发表于 2025-3-22 22:08:20

Peng Zhaole tool for developing highly-efficient cryptographic primitives suitable for resource-constrained devices such as RFID tags. This article surveys recent work aimed at designing efficient authentication protocols based on the conjectured hardness of this problem.

Amplify 发表于 2025-3-23 05:01:40

http://reply.papertrans.cn/25/2406/240563/240563_9.png

CERE 发表于 2025-3-23 07:37:44

Galois Rings and Pseudo-random SequencesWe survey our constructions of pseudo random sequences (binary, ., ....) from Galois rings. Techniques include a local Weil bound for character sums, and several kinds of Fourier transform. Applications range from cryptography (boolean functions, key generation), to communications (multi-code CDMA), to signal processing (PAPR reduction).
页: [1] 2 3 4
查看完整版本: Titlebook: Cryptography and Coding; 11th IMA Internation Steven D. Galbraith Conference proceedings 2007 Springer-Verlag Berlin Heidelberg 2007 AES.Ac