祈求 发表于 2025-3-21 16:28:51

书目名称Information Security and Cryptology影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465366<br><br>        <br><br>书目名称Information Security and Cryptology影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465366<br><br>        <br><br>书目名称Information Security and Cryptology网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465366<br><br>        <br><br>书目名称Information Security and Cryptology网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465366<br><br>        <br><br>书目名称Information Security and Cryptology被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465366<br><br>        <br><br>书目名称Information Security and Cryptology被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465366<br><br>        <br><br>书目名称Information Security and Cryptology年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465366<br><br>        <br><br>书目名称Information Security and Cryptology年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465366<br><br>        <br><br>书目名称Information Security and Cryptology读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465366<br><br>        <br><br>书目名称Information Security and Cryptology读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465366<br><br>        <br><br>

aesthetic 发表于 2025-3-21 20:51:57

http://reply.papertrans.cn/47/4654/465366/465366_2.png

柔美流畅 发表于 2025-3-22 03:35:11

http://reply.papertrans.cn/47/4654/465366/465366_3.png

修改 发表于 2025-3-22 08:33:52

http://reply.papertrans.cn/47/4654/465366/465366_4.png

indifferent 发表于 2025-3-22 09:31:57

http://reply.papertrans.cn/47/4654/465366/465366_5.png

wreathe 发表于 2025-3-22 15:28:09

Towards a General RC4-Like Keystream Generatorit RC4. Further, on a 32-bit processor the generator is 3.1 times faster than original RC4. We also show that it can resist attacks that are successful on the original RC4. The generator is suitable for high speed software encryption.

CORE 发表于 2025-3-22 20:30:04

http://reply.papertrans.cn/47/4654/465366/465366_7.png

Resign 发表于 2025-3-22 23:24:09

You Can Prove So Many Things in Zero-Knowledgeresults about proofs of non-zero knowledge, and, in the process, revisit previously studied protocols, described as ‘proofs of partial knowledge’, which are particular cases of proofs of non-zero knowledge.

Expostulate 发表于 2025-3-23 02:45:36

http://reply.papertrans.cn/47/4654/465366/465366_9.png

Density 发表于 2025-3-23 06:04:56

Constructing Secure Proxy Cryptosystemd Silverberg, the FSPE scheme of Canetti et al. and the scheme of Fujisaki and Okamoto, and is proven to be secure based on the hardness of bilinear Diffie-Hellman assumption. At last, we give an identity based (ID-based) version of the proxy cryptosystem based on time segmentation.
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology; First SKLOIS Confere Dengguo Feng,Dongdai Lin,Moti Yung Conference proceedings 2005 Springer-Verlag Be