卑贱 发表于 2025-3-21 19:51:09

书目名称Information Security Applications影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465290<br><br>        <br><br>书目名称Information Security Applications影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465290<br><br>        <br><br>书目名称Information Security Applications网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465290<br><br>        <br><br>书目名称Information Security Applications网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465290<br><br>        <br><br>书目名称Information Security Applications被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465290<br><br>        <br><br>书目名称Information Security Applications被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465290<br><br>        <br><br>书目名称Information Security Applications年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465290<br><br>        <br><br>书目名称Information Security Applications年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465290<br><br>        <br><br>书目名称Information Security Applications读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465290<br><br>        <br><br>书目名称Information Security Applications读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465290<br><br>        <br><br>

变形 发表于 2025-3-21 20:27:40

http://reply.papertrans.cn/47/4653/465290/465290_2.png

细胞 发表于 2025-3-22 01:26:59

A New Efficient Construction for Non-Malleable Zero-Knowledge Setseither “. ∈ .” or “.” without revealing any more knowledge of the set S. Afterwards, R.Gennaro defined the concept of independence for ZKS and gave two tree-based constructions. In this paper, we define the independence property for ZKS in a more flexible way than the definition of Gennaro’s and pro

Amylase 发表于 2025-3-22 08:01:26

Distributed Paillier Cryptosystem without Trusted Dealeraillier cryptosystem, the existence of a trusted dealer is assumed to distribute secret key shares, but it can be a single point of attack, so it is not preferable. Building on the threshold Paillier cryptosystem with a trusted dealer, we show how to eliminate the trusted dealer by robust distribute

本土 发表于 2025-3-22 11:14:22

Fast Scalar Multiplication for ECC over GF(,) Using Division Chainsnts . and . where the underlying field is a prime field. To make best use of these in a scalar multiplication ., it is necessary to generate an efficient “division chain” for the scalar where divisions of . are by the values of . available through composite operations..An algorithm-generating algori

arrogant 发表于 2025-3-22 16:34:11

Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs registers (LFSRs). Similarly to LFSRs, FCSRs have an underlying algebraic structure that facilitates their analysis, and their output sequences have many desirable statistical properties. Besides their direct applications as pseudorandom number generators, they have proven useful as building blocks

Alcove 发表于 2025-3-22 21:03:53

Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devicesthis work, we present the low-resource hardware implementation of a 16-bit microprocessor that is able to efficiently perform Elliptic Curve Cryptography (ECC). The highly optimized design features the calculation of the Elliptic Curve Digital Signature Algorithm (ECDSA) using the standardized NIST

烦人 发表于 2025-3-23 01:11:14

http://reply.papertrans.cn/47/4653/465290/465290_8.png

搜集 发表于 2025-3-23 01:57:59

Using Special Use Cases for Security in the Software Development Life Cycler to position security concerns at the very beginning of this process and to get “secure applications”. These concepts are built upon the “use case” concept which is well known by the community of application developers in companies and by the application sponsors. The application sponsors are the k

高兴一回 发表于 2025-3-23 08:46:24

http://reply.papertrans.cn/47/4653/465290/465290_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security Applications; 11th International W Yongwha Chung,Moti Yung Conference proceedings 2011 Springer Berlin Heidelberg 2011