过分爱国主义 发表于 2025-3-21 17:55:44
书目名称Information Security and Cryptology影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0465357<br><br> <br><br>书目名称Information Security and Cryptology影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0465357<br><br> <br><br>书目名称Information Security and Cryptology网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0465357<br><br> <br><br>书目名称Information Security and Cryptology网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0465357<br><br> <br><br>书目名称Information Security and Cryptology被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0465357<br><br> <br><br>书目名称Information Security and Cryptology被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0465357<br><br> <br><br>书目名称Information Security and Cryptology年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0465357<br><br> <br><br>书目名称Information Security and Cryptology年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0465357<br><br> <br><br>书目名称Information Security and Cryptology读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0465357<br><br> <br><br>书目名称Information Security and Cryptology读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0465357<br><br> <br><br>anarchist 发表于 2025-3-21 21:29:06
Supervised Usage of Signature Creation Devicesthe holder of an SSCD – this has to prevent testing integrity of the list after list manipulations searching for a false-positive result..Our solution works for a wide class of signatures based on Discrete Logarithm Problem without any changes of the signature format..We provide formal security proofs as well as discuss implementation issues.影响深远 发表于 2025-3-22 02:17:34
http://reply.papertrans.cn/47/4654/465357/465357_3.pngdermatomyositis 发表于 2025-3-22 05:56:20
The Gallant-Lambert-Vanstone Decomposition Revisitedsome genus . and . curves with efficient endomorphisms through decomposing the Frobenius map in ., which also indicate that the complex multiplication usually implies good properties for GLV decomposition. Our results well support the GLV method for faster implementations of scalar multiplications on desired curves.ALT 发表于 2025-3-22 09:33:48
http://reply.papertrans.cn/47/4654/465357/465357_5.pngCcu106 发表于 2025-3-22 16:55:51
http://reply.papertrans.cn/47/4654/465357/465357_6.png寻找 发表于 2025-3-22 17:13:01
http://reply.papertrans.cn/47/4654/465357/465357_7.pngJOT 发表于 2025-3-22 23:23:33
http://reply.papertrans.cn/47/4654/465357/465357_8.png性上瘾 发表于 2025-3-23 03:43:35
Conference proceedings 2014 Inscrypt 2013, held in Guangzhou, China, in November 2013..The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems卷发 发表于 2025-3-23 07:49:39
A Note on Semi-bent and Hyper-bent Boolean Functionss of semi-bent quadratic Boolean function of the form .,. is simply characterized and enumerated. Then we present the characterization of a generalization of a new class of hyper-bent Boolean functions of the form ., where ., ., . and ..