谴责 发表于 2025-3-21 16:56:28

书目名称Information Security影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465258<br><br>        <br><br>书目名称Information Security影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465258<br><br>        <br><br>书目名称Information Security网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465258<br><br>        <br><br>书目名称Information Security网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465258<br><br>        <br><br>书目名称Information Security被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465258<br><br>        <br><br>书目名称Information Security被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465258<br><br>        <br><br>书目名称Information Security年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465258<br><br>        <br><br>书目名称Information Security年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465258<br><br>        <br><br>书目名称Information Security读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465258<br><br>        <br><br>书目名称Information Security读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465258<br><br>        <br><br>

不知疲倦 发表于 2025-3-21 23:41:11

https://doi.org/10.1007/BFb0030404Algorithms; Automat; Hardware; Public Key; Smart Card; automata; communication; cryptography; data security;

homocysteine 发表于 2025-3-22 02:07:28

http://reply.papertrans.cn/47/4653/465258/465258_3.png

附录 发表于 2025-3-22 05:19:44

Information Security978-3-540-69767-1Series ISSN 0302-9743 Series E-ISSN 1611-3349

Perceive 发表于 2025-3-22 12:21:21

http://reply.papertrans.cn/47/4653/465258/465258_5.png

名义上 发表于 2025-3-22 15:40:03

http://reply.papertrans.cn/47/4653/465258/465258_6.png

Melodrama 发表于 2025-3-22 19:07:14

Remarks on blind decryption,This paper describes two attacks against blind decryption (decode) based on the commutative random-self reducibility and RSA systems utilizing the transformability of digital signatures proposed in

阻止 发表于 2025-3-22 23:56:13

High-speed cryptography,We present a new method for achieving high speed encryption and decryption using large-block cryptosystems. The method applies to both private and public key cryptosystems. The method amplifies the encrypting speed of any cryptosystem, and it is provably reducible to the latter.

迷住 发表于 2025-3-23 04:15:07

Secure applications of low-entropy keys,We introduce the notion of key stretching, a mechanism to convert short .-bit keys into longer keys, such that the complexity required to brute-force search a . + .-bit keyspace is the same as the time required to brute-force search a .-bit key stretched by . bits.

convert 发表于 2025-3-23 08:07:01

accessible graphics workstations. Many of the simulator platforms have had tremendous success due to the fact that a common object format was used. Prototyping time is dramatically reduced when the tedious and often repetitious task of object design is replaced with the simpler task of modifying an
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security; First International Eiji Okamoto,George Davida,Masahiro Mambo Conference proceedings 1998 Springer-Verlag Berlin Hei