PANT 发表于 2025-3-26 23:12:21
http://reply.papertrans.cn/47/4653/465258/465258_31.pngOsteoporosis 发表于 2025-3-27 03:47:35
An optimised linear attack on pseudorandom generators using a non-linear combiner,ft Registers (LFSR) and a non linear function . (·). We derive an attacking equation (AEQ) using a linear approximation of .(·) and the, generator polynomials of LFSRs. In the AEQ we focus on the initial value of one LFSR in the generator by eliminating the initial values of the other LFSRs using thNonflammable 发表于 2025-3-27 06:02:19
http://reply.papertrans.cn/47/4653/465258/465258_33.png法律的瑕疵 发表于 2025-3-27 12:20:28
The least witness of a composite number,udo-prime to the base . is called a . for .. Let .(.) be the least witness for a composite .. Bach assuming the Generalized Riemann Hypothesis (GRH) showed that .(.) < 2log. n. In this paper we are interested in obtaining upper bounds for .(.) without assuming the GRH..Burthe [15) showed that .(Enrage 发表于 2025-3-27 14:05:49
Fast algorithm for finding a small root of a quadratic modular equation,e small root of the quadratic modular equation. While previous algorithms for finding the small root of the modular equation are based on the LLL algorithm, the new algorithm is based on the continued fraction. Using the new algorithm, we can find the root less than .., where . is the modulus. The n积极词汇 发表于 2025-3-27 21:39:31
Modified Finite Automata Public Key Cryptosystem, stream-cipher capable of high-speed operation and it has a relatively small key size. Recently, FAPKC was broken in a way that the decryption automata can be derived directly from the encryption automaton . However, the break is due to an oversight of the FAPKC designers. It does not reveal anyPrognosis 发表于 2025-3-27 23:26:27
Modified ElGamal cryptosystem, for plural users, and is also applicable to the systems which have hierarchical structures. And, we show that the security of this cryptosystem is based on difficulties of solving discrete logarithm problems , it maintains equivalent security with the original ElGamal cryptosystem. The transmission鲁莽 发表于 2025-3-28 05:46:12
http://reply.papertrans.cn/47/4653/465258/465258_38.png披肩 发表于 2025-3-28 08:11:51
,A key escrow system with protecting user’s privacy by blind decoding,d with a server‘s secret key and the client asks the server to decode the message without revealing what is the decoded plaintext nor learning the server‘s secret key. Our system also introduces two agencies besides the trustees. These are related to the mechanism of registering users and of distribcrumble 发表于 2025-3-28 13:17:47
http://reply.papertrans.cn/47/4653/465258/465258_40.png