PANT 发表于 2025-3-26 23:12:21

http://reply.papertrans.cn/47/4653/465258/465258_31.png

Osteoporosis 发表于 2025-3-27 03:47:35

An optimised linear attack on pseudorandom generators using a non-linear combiner,ft Registers (LFSR) and a non linear function . (·). We derive an attacking equation (AEQ) using a linear approximation of .(·) and the, generator polynomials of LFSRs. In the AEQ we focus on the initial value of one LFSR in the generator by eliminating the initial values of the other LFSRs using th

Nonflammable 发表于 2025-3-27 06:02:19

http://reply.papertrans.cn/47/4653/465258/465258_33.png

法律的瑕疵 发表于 2025-3-27 12:20:28

The least witness of a composite number,udo-prime to the base . is called a . for .. Let .(.) be the least witness for a composite .. Bach assuming the Generalized Riemann Hypothesis (GRH) showed that .(.) < 2log. n. In this paper we are interested in obtaining upper bounds for .(.) without assuming the GRH..Burthe [15) showed that .(

Enrage 发表于 2025-3-27 14:05:49

Fast algorithm for finding a small root of a quadratic modular equation,e small root of the quadratic modular equation. While previous algorithms for finding the small root of the modular equation are based on the LLL algorithm, the new algorithm is based on the continued fraction. Using the new algorithm, we can find the root less than .., where . is the modulus. The n

积极词汇 发表于 2025-3-27 21:39:31

Modified Finite Automata Public Key Cryptosystem, stream-cipher capable of high-speed operation and it has a relatively small key size. Recently, FAPKC was broken in a way that the decryption automata can be derived directly from the encryption automaton . However, the break is due to an oversight of the FAPKC designers. It does not reveal any

Prognosis 发表于 2025-3-27 23:26:27

Modified ElGamal cryptosystem, for plural users, and is also applicable to the systems which have hierarchical structures. And, we show that the security of this cryptosystem is based on difficulties of solving discrete logarithm problems , it maintains equivalent security with the original ElGamal cryptosystem. The transmission

鲁莽 发表于 2025-3-28 05:46:12

http://reply.papertrans.cn/47/4653/465258/465258_38.png

披肩 发表于 2025-3-28 08:11:51

,A key escrow system with protecting user’s privacy by blind decoding,d with a server‘s secret key and the client asks the server to decode the message without revealing what is the decoded plaintext nor learning the server‘s secret key. Our system also introduces two agencies besides the trustees. These are related to the mechanism of registering users and of distrib

crumble 发表于 2025-3-28 13:17:47

http://reply.papertrans.cn/47/4653/465258/465258_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Security; First International Eiji Okamoto,George Davida,Masahiro Mambo Conference proceedings 1998 Springer-Verlag Berlin Hei