疲劳 发表于 2025-3-25 05:37:29

http://reply.papertrans.cn/47/4654/465364/465364_21.png

作呕 发表于 2025-3-25 08:05:20

http://reply.papertrans.cn/47/4654/465364/465364_22.png

消息灵通 发表于 2025-3-25 12:10:34

http://reply.papertrans.cn/47/4654/465364/465364_23.png

不法行为 发表于 2025-3-25 19:43:03

An Efficient ID-Based Proxy Signature Scheme from Pairingsprocedure of our scheme is only one, so our scheme is more efficient comparatively. The new scheme can be proved secure with the hardness assumption of the .-Bilinear Diffie-Hellman Inverse problem, in the random oracle model.

含糊其辞 发表于 2025-3-25 22:12:41

http://reply.papertrans.cn/47/4654/465364/465364_25.png

放肆的我 发表于 2025-3-26 01:50:32

Four Families of Binary Sequences with Low Correlation and Large Linear Complexityr odd ., and .., .. for even .. The family .. has six-valued correlations, while .. and .. have either six-valued correlations or eight-valued correlations, and .. has either eight-valued or ten-valued, depending on the choice of parameters.

LAVE 发表于 2025-3-26 06:15:27

http://reply.papertrans.cn/47/4654/465364/465364_27.png

BOON 发表于 2025-3-26 11:25:50

Conference proceedings 2008ce on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007...The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organi

PALSY 发表于 2025-3-26 15:12:43

http://reply.papertrans.cn/47/4654/465364/465364_29.png

使人烦燥 发表于 2025-3-26 19:56:12

http://reply.papertrans.cn/47/4654/465364/465364_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology; Third SKLOIS Confere Dingyi Pei,Moti Yung,Chuankun Wu Conference proceedings 2008 Springer-Verlag Berl