衰退 发表于 2025-3-21 18:44:04

书目名称Information Security and Cryptology影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465354<br><br>        <br><br>书目名称Information Security and Cryptology影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465354<br><br>        <br><br>书目名称Information Security and Cryptology网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465354<br><br>        <br><br>书目名称Information Security and Cryptology网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465354<br><br>        <br><br>书目名称Information Security and Cryptology被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465354<br><br>        <br><br>书目名称Information Security and Cryptology被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465354<br><br>        <br><br>书目名称Information Security and Cryptology年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465354<br><br>        <br><br>书目名称Information Security and Cryptology年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465354<br><br>        <br><br>书目名称Information Security and Cryptology读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465354<br><br>        <br><br>书目名称Information Security and Cryptology读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465354<br><br>        <br><br>

密码 发表于 2025-3-21 22:58:37

http://reply.papertrans.cn/47/4654/465354/465354_2.png

hangdog 发表于 2025-3-22 01:43:21

http://reply.papertrans.cn/47/4654/465354/465354_3.png

吃掉 发表于 2025-3-22 08:36:13

0302-9743 and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography;  commitment and protocol; elliptic curves; security and implementation..978-3-319-54704-6978-3-319-54705-3Series ISSN 0302-9743 Series E-ISSN 1611-3349

枕垫 发表于 2025-3-22 11:58:20

http://reply.papertrans.cn/47/4654/465354/465354_5.png

并置 发表于 2025-3-22 13:28:01

http://reply.papertrans.cn/47/4654/465354/465354_6.png

圆锥体 发表于 2025-3-22 19:57:02

http://reply.papertrans.cn/47/4654/465354/465354_7.png

conscribe 发表于 2025-3-22 23:05:28

Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Boundssome works on the analysis of QUAD as well as design extensions of QUAD, but to our knowledge no work has addressed the existence of tighter bounds. In this paper, we revisit the proof technique by the authors and correct some bugs in their proof. Further, we derive tighter security bounds using two approaches.

6Applepolish 发表于 2025-3-23 02:24:02

Conference proceedings 2017ns. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography;  commitment and protocol; elliptic curves; security and implementation..

Graves’-disease 发表于 2025-3-23 07:21:38

0302-9743 nce on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016.. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Information Security and Cryptology; 12th International C Kefei Chen,Dongdai Lin,Moti Yung Conference proceedings 2017 Springer Internation