Corticosteroids 发表于 2025-3-21 16:44:42

书目名称Cryptography and Security Systems影响因子(影响力)<br>        http://impactfactor.cn/2024/if/?ISSN=BK0240583<br><br>        <br><br>书目名称Cryptography and Security Systems影响因子(影响力)学科排名<br>        http://impactfactor.cn/2024/ifr/?ISSN=BK0240583<br><br>        <br><br>书目名称Cryptography and Security Systems网络公开度<br>        http://impactfactor.cn/2024/at/?ISSN=BK0240583<br><br>        <br><br>书目名称Cryptography and Security Systems网络公开度学科排名<br>        http://impactfactor.cn/2024/atr/?ISSN=BK0240583<br><br>        <br><br>书目名称Cryptography and Security Systems被引频次<br>        http://impactfactor.cn/2024/tc/?ISSN=BK0240583<br><br>        <br><br>书目名称Cryptography and Security Systems被引频次学科排名<br>        http://impactfactor.cn/2024/tcr/?ISSN=BK0240583<br><br>        <br><br>书目名称Cryptography and Security Systems年度引用<br>        http://impactfactor.cn/2024/ii/?ISSN=BK0240583<br><br>        <br><br>书目名称Cryptography and Security Systems年度引用学科排名<br>        http://impactfactor.cn/2024/iir/?ISSN=BK0240583<br><br>        <br><br>书目名称Cryptography and Security Systems读者反馈<br>        http://impactfactor.cn/2024/5y/?ISSN=BK0240583<br><br>        <br><br>书目名称Cryptography and Security Systems读者反馈学科排名<br>        http://impactfactor.cn/2024/5yr/?ISSN=BK0240583<br><br>        <br><br>

弯弯曲曲 发表于 2025-3-21 21:49:23

On a Cipher Based on Pseudo-random Walks on Graphs,In the paper a cipher which uses transition graph in the encryption and decryption processes is presented. It is created based on some ideas of dynamic systems (symbolic dynamics). The introduced cipher is tested according to the suggestions of FIPS 140-2 standard and the results are presented in the paper.

哪有黄油 发表于 2025-3-22 01:23:42

Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/240583.jpg

毗邻 发表于 2025-3-22 06:39:37

https://doi.org/10.1007/978-3-662-44893-9cryptographic protocols; cybercrime; data protection; formal methods and theory of security; network sec

慢跑鞋 发表于 2025-3-22 11:11:13

978-3-662-44892-2Springer-Verlag Berlin Heidelberg 2014

COLON 发表于 2025-3-22 13:49:43

Numerical Semigroups and Bounds on Impossible Differential Attacks on Generalized Feistel Schemes, we provide upper and lower bounds for the maximum number of rounds when impossible differential technique is applicable for any cipher from the family. These estimations do not depend on the type of Feistel scheme and the number of non-linear functions.

COLON 发表于 2025-3-22 20:30:26

Conference proceedings 2014oland, in September 2014. The 17 revised full papers presented were carefully reviewed and selected from 43 submissions. 7 of those papers concern different areas of cryptography, while the remaining 10 deal with recent problems of cryptographic protocols.

Pruritus 发表于 2025-3-22 21:33:35

http://reply.papertrans.cn/25/2406/240583/240583_8.png

INERT 发表于 2025-3-23 04:35:23

Behavioral Hardware Description Languages, we provide upper and lower bounds for the maximum number of rounds when impossible differential technique is applicable for any cipher from the family. These estimations do not depend on the type of Feistel scheme and the number of non-linear functions.

Audiometry 发表于 2025-3-23 08:56:54

Behavioral Hardware Description Languages,ir-by-pair, in such a way that the sums of the code word lengths of an original pair and its substitute are equal. Thus our method preserves structures and lengths of bit streams that result from the Huffman encoding. This is advantageous if such a bit stream is embedded in a higher-level data conta
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Cryptography and Security Systems; Third International Zbigniew Kotulski,Bogdan Księżopolski,Katarzyna Ma Conference proceedings 2014 Spri