PEL 发表于 2025-3-21 20:05:30
书目名称Cryptography and Computational Number Theory影响因子(影响力)<br> http://impactfactor.cn/if/?ISSN=BK0240577<br><br> <br><br>书目名称Cryptography and Computational Number Theory影响因子(影响力)学科排名<br> http://impactfactor.cn/ifr/?ISSN=BK0240577<br><br> <br><br>书目名称Cryptography and Computational Number Theory网络公开度<br> http://impactfactor.cn/at/?ISSN=BK0240577<br><br> <br><br>书目名称Cryptography and Computational Number Theory网络公开度学科排名<br> http://impactfactor.cn/atr/?ISSN=BK0240577<br><br> <br><br>书目名称Cryptography and Computational Number Theory被引频次<br> http://impactfactor.cn/tc/?ISSN=BK0240577<br><br> <br><br>书目名称Cryptography and Computational Number Theory被引频次学科排名<br> http://impactfactor.cn/tcr/?ISSN=BK0240577<br><br> <br><br>书目名称Cryptography and Computational Number Theory年度引用<br> http://impactfactor.cn/ii/?ISSN=BK0240577<br><br> <br><br>书目名称Cryptography and Computational Number Theory年度引用学科排名<br> http://impactfactor.cn/iir/?ISSN=BK0240577<br><br> <br><br>书目名称Cryptography and Computational Number Theory读者反馈<br> http://impactfactor.cn/5y/?ISSN=BK0240577<br><br> <br><br>书目名称Cryptography and Computational Number Theory读者反馈学科排名<br> http://impactfactor.cn/5yr/?ISSN=BK0240577<br><br> <br><br>Cantankerous 发表于 2025-3-21 20:18:26
978-3-0348-9507-1Springer Basel AG 2001Inflated 发表于 2025-3-22 03:30:03
Small Values of the Carmichael Function and Cryptographic Applicationswer generator of pseudorandom numbers. Namely, we show rigorously that almost all randomly selected RSA moduli are safe against the so-called cycling attack and we also provide some arguments in support of the reliability of the timed-release crypto scheme, which has recently been proposed by R. L. Rivest, A. Shamir and D. A. Wagner.单独 发表于 2025-3-22 07:16:30
A Survey of Divide and Conquer Attacks on Certain Irregularly Clocked Stream Cipherse resistance against the conventional correlation attacks. This paper presents a survey of recent attacks, including correlation attacks, on several such keystream generators. These results demonstrate that despite the use of irregular clocking, such generators may still be vulnerable to certain divide and conquer attacks.Certainty 发表于 2025-3-22 12:17:04
,Self Insurance in Workers’ Compensation,In this paper we study the relation between the dimension of a parametric variety and the number of parameters. We present an algorithm to reparameterize a variety in order to obtain a parameterization where the number of parameters equals the dimension of the variety.Pericarditis 发表于 2025-3-22 15:20:30
http://reply.papertrans.cn/25/2406/240577/240577_6.pngPericarditis 发表于 2025-3-22 20:13:43
Soo-Joong Ghim,Yong-Ik Yoon,Ilkyeun RaIn this report, we discuss Hansen-Mullen’s conjecture on the distributions of primitive polynomials over finite field in two cases: 1). second coefficient and odd characteristic; 2). second coefficient and even characteristic.大暴雨 发表于 2025-3-22 21:32:51
http://reply.papertrans.cn/25/2406/240577/240577_8.png左右连贯 发表于 2025-3-23 04:25:20
On Using Conceptual Modeling for OntologiesLet . where . is a prime not dividing .. We show how a special class of functions . : ... can be used to help obtain . given .. The requirements of . are that it be non-trivial and that . (.) = . (. mod .). Such a function does not “see” .. Hence the name ..nugatory 发表于 2025-3-23 08:02:37
Web Information Exchange Diagrams for UMLWe survey some recent constructions of various sequences based on algebraic curves over finite fields.