桌前不可入 发表于 2025-3-21 20:07:03

书目名称Cryptography and Information Security in the Balkans影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0240581<br><br>        <br><br>书目名称Cryptography and Information Security in the Balkans影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0240581<br><br>        <br><br>书目名称Cryptography and Information Security in the Balkans网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0240581<br><br>        <br><br>书目名称Cryptography and Information Security in the Balkans网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0240581<br><br>        <br><br>书目名称Cryptography and Information Security in the Balkans被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0240581<br><br>        <br><br>书目名称Cryptography and Information Security in the Balkans被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0240581<br><br>        <br><br>书目名称Cryptography and Information Security in the Balkans年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0240581<br><br>        <br><br>书目名称Cryptography and Information Security in the Balkans年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0240581<br><br>        <br><br>书目名称Cryptography and Information Security in the Balkans读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0240581<br><br>        <br><br>书目名称Cryptography and Information Security in the Balkans读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0240581<br><br>        <br><br>

ablate 发表于 2025-3-21 20:23:05

On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDAmentations of polynomial multiplications into a lattice-based signature scheme proposed by Güneysu et al. (CHES 2012) and identify which algorithm is the preferable choice with respect to the ring of degree ..

营养 发表于 2025-3-22 02:55:06

Conference proceedings 2016ec 2015, held in Koper, Slovenia, in September 2015..The 12 papers presented inthis volume were carefully reviewed and selected from 27 submissions. They areorganized in topical sections named: symmetric key cryptography; cryptanalysis;security and protocols; and implementation and verifiable encryp

睨视 发表于 2025-3-22 05:56:30

0302-9743 mation Security inthe Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015..The 12 papers presented inthis volume were carefully reviewed and selected from 27 submissions. They areorganized in topical sections named: symmetric key cryptography; cryptanalysis;security and protocol

策略 发表于 2025-3-22 10:07:13

Web Caching and Its Applicationslgebraic immunity. This new approach, which exploits properties of the punctured Reed–Muller codes, suffices to generate a large number of new functions with maximum algebraic immunity through swapping an arbitrary number of elements between the support of . and its complement.

inquisitive 发表于 2025-3-22 13:56:48

Fault Tolerance in Caching Systemsprobabilities significantly higher than the random case. We note that the presented results do not threaten the security of the scheme. This is the first external analysis of the authenticated cipher MORUS.

inquisitive 发表于 2025-3-22 17:55:59

http://reply.papertrans.cn/25/2406/240581/240581_7.png

无聊点好 发表于 2025-3-22 22:56:37

Fault Tolerance in Caching Systems, the corresponding bias and the number of effective bits depend crucially on the parity position chosen, and may lead not only to reduction but as well to growth in complexity of successful linear cryptanalysis compared to that towards the original DES.

Cumulus 发表于 2025-3-23 02:40:14

Fault Tolerance in Caching Systems than the multiplication depth of the leveled multi-linear map in the scheme in [.]. Selective security of the proposed scheme in the standard model is proved, under the decisional multi-linear Diffie-Hellman assumption.

AV-node 发表于 2025-3-23 05:59:01

Cryptographically Strong S-Boxes Generated by Modified Immune Algorithmnal selection algorithm, combined with a slightly modified hill climbing method for S-boxes. Using this special algorithm we generate large sets of highly nonlinear bijective S-boxes of low differential uniformity in a reasonable search time.
页: [1] 2 3 4 5
查看完整版本: Titlebook: Cryptography and Information Security in the Balkans; Second International Enes Pasalic,Lars R. Knudsen Conference proceedings 2016 Springe