过分爱国主义 发表于 2025-3-21 17:55:44

书目名称Information Security and Cryptology影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465357<br><br>        <br><br>书目名称Information Security and Cryptology影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465357<br><br>        <br><br>书目名称Information Security and Cryptology网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465357<br><br>        <br><br>书目名称Information Security and Cryptology网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465357<br><br>        <br><br>书目名称Information Security and Cryptology被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465357<br><br>        <br><br>书目名称Information Security and Cryptology被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465357<br><br>        <br><br>书目名称Information Security and Cryptology年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465357<br><br>        <br><br>书目名称Information Security and Cryptology年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465357<br><br>        <br><br>书目名称Information Security and Cryptology读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465357<br><br>        <br><br>书目名称Information Security and Cryptology读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465357<br><br>        <br><br>

anarchist 发表于 2025-3-21 21:29:06

Supervised Usage of Signature Creation Devicesthe holder of an SSCD – this has to prevent testing integrity of the list after list manipulations searching for a false-positive result..Our solution works for a wide class of signatures based on Discrete Logarithm Problem without any changes of the signature format..We provide formal security proofs as well as discuss implementation issues.

影响深远 发表于 2025-3-22 02:17:34

http://reply.papertrans.cn/47/4654/465357/465357_3.png

dermatomyositis 发表于 2025-3-22 05:56:20

The Gallant-Lambert-Vanstone Decomposition Revisitedsome genus . and . curves with efficient endomorphisms through decomposing the Frobenius map in ., which also indicate that the complex multiplication usually implies good properties for GLV decomposition. Our results well support the GLV method for faster implementations of scalar multiplications on desired curves.

ALT 发表于 2025-3-22 09:33:48

http://reply.papertrans.cn/47/4654/465357/465357_5.png

Ccu106 发表于 2025-3-22 16:55:51

http://reply.papertrans.cn/47/4654/465357/465357_6.png

寻找 发表于 2025-3-22 17:13:01

http://reply.papertrans.cn/47/4654/465357/465357_7.png

JOT 发表于 2025-3-22 23:23:33

http://reply.papertrans.cn/47/4654/465357/465357_8.png

性上瘾 发表于 2025-3-23 03:43:35

Conference proceedings 2014 Inscrypt 2013, held in Guangzhou, China, in November 2013..The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems

卷发 发表于 2025-3-23 07:49:39

A Note on Semi-bent and Hyper-bent Boolean Functionss of semi-bent quadratic Boolean function of the form .,. is simply characterized and enumerated. Then we present the characterization of a generalization of a new class of hyper-bent Boolean functions of the form ., where ., ., . and ..
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology; 9th International Co Dongdai Lin,Shouhuai Xu,Moti Yung Conference proceedings 2014 Springer Internatio