全等 发表于 2025-4-1 04:58:11

The ,th-Order Quasi-Generalized Bent Functions over Ring , , for this kind of functions, called as .th-order quasi-generalized Bent functions, take only two values—0 and a nonzero constant. By using the relationships between . spectra and the autocorrelation functions for logical functions over ring .., we present some equivalent definitions of this kind of

senile-dementia 发表于 2025-4-1 06:53:16

http://reply.papertrans.cn/47/4654/465366/465366_62.png

jagged 发表于 2025-4-1 13:47:07

http://reply.papertrans.cn/47/4654/465366/465366_63.png

躲债 发表于 2025-4-1 15:55:30

An Improved Secure Two-Party Computation Protocolrmation regarding their private inputs more than what can be inferred from ..(.., ..). This problem is referred to as a secure two-party computation and Yao proposed a solution to privately compute .. using garbled circuits. In this paper, we improve the efficiency of circuit by hardwiring the input

hermetic 发表于 2025-4-1 21:37:39

http://reply.papertrans.cn/47/4654/465366/465366_65.png

Condescending 发表于 2025-4-1 23:36:51

http://reply.papertrans.cn/47/4654/465366/465366_66.png

Left-Atrium 发表于 2025-4-2 05:28:26

http://reply.papertrans.cn/47/4654/465366/465366_67.png
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Information Security and Cryptology; First SKLOIS Confere Dengguo Feng,Dongdai Lin,Moti Yung Conference proceedings 2005 Springer-Verlag Be