字形刻痕
发表于 2025-3-26 22:15:04
http://reply.papertrans.cn/25/2407/240611/240611_31.png
MERIT
发表于 2025-3-27 01:16:43
http://reply.papertrans.cn/25/2407/240611/240611_32.png
COLIC
发表于 2025-3-27 05:35:11
Cryptology and Network Security978-3-540-89641-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
继而发生
发表于 2025-3-27 10:03:45
http://reply.papertrans.cn/25/2407/240611/240611_34.png
挡泥板
发表于 2025-3-27 16:48:52
Authentication and user managementbenius map, an efficient scalar multiplication method for pairing–friendly elliptic curve . is shown. According to the simulation result, a scalar multiplication by the proposed method with multi–exponentiation technique is about 40% faster than that by plain binary method.
CRACY
发表于 2025-3-27 17:49:16
The Zope 3 Component ArchitectureBased on a [.,.,. + 1]-code ., an approach to construct (., ., .) resilient functions with multiple cryptographic criteria including high nonlinearity, high algebraic degree and nonexistence of nonzero linear structure is described. Particularly, when . = 2., this kind of construction can be made simply.
foppish
发表于 2025-3-28 01:24:47
Construction of Resilient Functions with Multiple Cryptographic CriteriaBased on a [.,.,. + 1]-code ., an approach to construct (., ., .) resilient functions with multiple cryptographic criteria including high nonlinearity, high algebraic degree and nonexistence of nonzero linear structure is described. Particularly, when . = 2., this kind of construction can be made simply.
configuration
发表于 2025-3-28 04:31:54
http://reply.papertrans.cn/25/2407/240611/240611_38.png
Genome
发表于 2025-3-28 10:17:14
http://reply.papertrans.cn/25/2407/240611/240611_39.png
Boycott
发表于 2025-3-28 12:00:45
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/240611.jpg