Cpr951 发表于 2025-3-28 14:58:25
A Randomised Algorithm for Checking The Normality of Cryptographic Boolean Functions is constant on them and combines such flats to flats of higher dimension in a second phase. This way, the algorithm is much faster than exhaustive search. Moreover, the algorithm benefits from randomising the first phase. In addition, by evaluating several flats implicitly in parallel, the time-complexity of the algorithm decreases further.脱水 发表于 2025-3-28 20:16:01
The Firing Squad Synchronization Problem with Many Generals for One-Dimensional CAbution of this paper on the algorithmic side. For the asynchronous case an exact formula for the optimum synchronization time of each instance is derived. We prove that no CA can solve all instances in optimum time, but we describe a CA whose running time is very close to it; it only needs additional .. steps.corpus-callosum 发表于 2025-3-29 00:30:43
http://reply.papertrans.cn/32/3196/319545/319545_43.pnganachronistic 发表于 2025-3-29 04:31:35
Approximation Algorithms for Mixed Fractional Packing and Covering Problemsterations or calls to the oracle. The main contribution is that the algorithm solves the general mixed fractional packing and covering problem (in contrast to pure fractional packing and covering problems and to the special mixed packing and covering problem with ..) and runs in time independent of the so-called width of the problem.偶然 发表于 2025-3-29 10:06:30
http://reply.papertrans.cn/32/3196/319545/319545_45.png清楚说话 发表于 2025-3-29 12:23:09
Remove key Escrow from the Identity-Based Encryption Systemthe same time maintaining some important properties of the IBE. We also present some cryptosystems based on our variant including a signature scheme and an authenticated key agreement. We finally show how to integrate our scheme into a hierarchial identity based public key encryption system.抛媚眼 发表于 2025-3-29 18:56:36
Stability of Approximation in Discrete Optimizationpect to this parametrization. When the approximation ratio grows with the parameter, but is independent of the size of the instances,then we speak about stable approximation algorithms. An interesting point is that there exist stable approximation algorithms for problems like TSP that is not approxiMetastasis 发表于 2025-3-29 20:48:26
Looking Inside , and ,g encryption and key generation processes. After some simple but rather cumbersome substitutions, we should obtain two new systems .. and ... .. has 16 very dense equations of degree up to 255 in each of its 16 variables. With a single pair (.), with . a cleartext and . its encryption, its roots givcringe 发表于 2025-3-30 02:13:25
Remove key Escrow from the Identity-Based Encryption Systemty for all applications. In this paper, we present a scheme which removes the key escrow from the IBE system proposed by Bonch and Franklin, while at the same time maintaining some important properties of the IBE. We also present some cryptosystems based on our variant including a signature scheme a蒸发 发表于 2025-3-30 08:08:26
A Randomised Algorithm for Checking The Normality of Cryptographic Boolean Functionssystems. This paper presents an asymmetric Monte Carlo algorithm to determine whether a given Boolean function is normal. Our algorithm is far faster than the best known (deterministic) algorithm of Daum et al. In a first phase, it checks for flats of low dimension whether the given Boolean function