字形刻痕 发表于 2025-3-26 22:15:04
http://reply.papertrans.cn/25/2407/240611/240611_31.pngMERIT 发表于 2025-3-27 01:16:43
http://reply.papertrans.cn/25/2407/240611/240611_32.pngCOLIC 发表于 2025-3-27 05:35:11
Cryptology and Network Security978-3-540-89641-8Series ISSN 0302-9743 Series E-ISSN 1611-3349继而发生 发表于 2025-3-27 10:03:45
http://reply.papertrans.cn/25/2407/240611/240611_34.png挡泥板 发表于 2025-3-27 16:48:52
Authentication and user managementbenius map, an efficient scalar multiplication method for pairing–friendly elliptic curve . is shown. According to the simulation result, a scalar multiplication by the proposed method with multi–exponentiation technique is about 40% faster than that by plain binary method.CRACY 发表于 2025-3-27 17:49:16
The Zope 3 Component ArchitectureBased on a [.,.,. + 1]-code ., an approach to construct (., ., .) resilient functions with multiple cryptographic criteria including high nonlinearity, high algebraic degree and nonexistence of nonzero linear structure is described. Particularly, when . = 2., this kind of construction can be made simply.foppish 发表于 2025-3-28 01:24:47
Construction of Resilient Functions with Multiple Cryptographic CriteriaBased on a [.,.,. + 1]-code ., an approach to construct (., ., .) resilient functions with multiple cryptographic criteria including high nonlinearity, high algebraic degree and nonexistence of nonzero linear structure is described. Particularly, when . = 2., this kind of construction can be made simply.configuration 发表于 2025-3-28 04:31:54
http://reply.papertrans.cn/25/2407/240611/240611_38.pngGenome 发表于 2025-3-28 10:17:14
http://reply.papertrans.cn/25/2407/240611/240611_39.pngBoycott 发表于 2025-3-28 12:00:45
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/240611.jpg