表示向前 发表于 2025-3-28 14:43:51

http://reply.papertrans.cn/25/2407/240613/240613_41.png

Chronic 发表于 2025-3-28 20:55:02

http://reply.papertrans.cn/25/2407/240613/240613_42.png

paltry 发表于 2025-3-28 23:24:49

http://reply.papertrans.cn/25/2407/240613/240613_43.png

monogamy 发表于 2025-3-29 05:19:48

Cryptology and Network Security978-3-540-49463-8Series ISSN 0302-9743 Series E-ISSN 1611-3349

bioavailability 发表于 2025-3-29 08:33:57

0302-9743 Overview: 978-3-540-49462-1978-3-540-49463-8Series ISSN 0302-9743 Series E-ISSN 1611-3349

Accolade 发表于 2025-3-29 13:14:00

http://reply.papertrans.cn/25/2407/240613/240613_46.png

欢笑 发表于 2025-3-29 17:18:48

Hassan Ebrahimirad,M. J. Yazdanpanahdifference sets, we construct a perfect nonlinear function from . to . where 2. is possibly larger than the largest divisor of .. Meanwhile we prove that there exists a perfect nonlinear function from . to . if and only if .=2, and that there doesn’t exist a perfect nonlinear function from . to . if .>. and .(. is odd) is . modulo 2.(.≥1) .

PARA 发表于 2025-3-29 22:22:17

http://reply.papertrans.cn/25/2407/240613/240613_48.png

boisterous 发表于 2025-3-30 03:04:57

http://reply.papertrans.cn/25/2407/240613/240613_49.png

玷污 发表于 2025-3-30 05:01:39

Watermarking Essential Data Structures for Copyright Protectiont on the operations and performance of the data structure..This paper proposes a novel method for watermarking R-tree data structure and its variants. The proposed watermarking scheme takes advantage of the redundancy in the way the entries within R-tree nodes are ordered. R-trees do not require ord
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Cryptology and Network Security; 5th International Co David Pointcheval,Yi Mu,Kefei Chen Conference proceedings 2006 Springer-Verlag Berlin