祈求 发表于 2025-3-21 16:28:51
书目名称Information Security and Cryptology影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0465366<br><br> <br><br>书目名称Information Security and Cryptology影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0465366<br><br> <br><br>书目名称Information Security and Cryptology网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0465366<br><br> <br><br>书目名称Information Security and Cryptology网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0465366<br><br> <br><br>书目名称Information Security and Cryptology被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0465366<br><br> <br><br>书目名称Information Security and Cryptology被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0465366<br><br> <br><br>书目名称Information Security and Cryptology年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0465366<br><br> <br><br>书目名称Information Security and Cryptology年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0465366<br><br> <br><br>书目名称Information Security and Cryptology读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0465366<br><br> <br><br>书目名称Information Security and Cryptology读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0465366<br><br> <br><br>aesthetic 发表于 2025-3-21 20:51:57
http://reply.papertrans.cn/47/4654/465366/465366_2.png柔美流畅 发表于 2025-3-22 03:35:11
http://reply.papertrans.cn/47/4654/465366/465366_3.png修改 发表于 2025-3-22 08:33:52
http://reply.papertrans.cn/47/4654/465366/465366_4.pngindifferent 发表于 2025-3-22 09:31:57
http://reply.papertrans.cn/47/4654/465366/465366_5.pngwreathe 发表于 2025-3-22 15:28:09
Towards a General RC4-Like Keystream Generatorit RC4. Further, on a 32-bit processor the generator is 3.1 times faster than original RC4. We also show that it can resist attacks that are successful on the original RC4. The generator is suitable for high speed software encryption.CORE 发表于 2025-3-22 20:30:04
http://reply.papertrans.cn/47/4654/465366/465366_7.pngResign 发表于 2025-3-22 23:24:09
You Can Prove So Many Things in Zero-Knowledgeresults about proofs of non-zero knowledge, and, in the process, revisit previously studied protocols, described as ‘proofs of partial knowledge’, which are particular cases of proofs of non-zero knowledge.Expostulate 发表于 2025-3-23 02:45:36
http://reply.papertrans.cn/47/4654/465366/465366_9.pngDensity 发表于 2025-3-23 06:04:56
Constructing Secure Proxy Cryptosystemd Silverberg, the FSPE scheme of Canetti et al. and the scheme of Fujisaki and Okamoto, and is proven to be secure based on the hardness of bilinear Diffie-Hellman assumption. At last, we give an identity based (ID-based) version of the proxy cryptosystem based on time segmentation.