antiquated 发表于 2025-3-30 09:12:19

http://reply.papertrans.cn/47/4654/465373/465373_51.png

Harpoon 发表于 2025-3-30 16:22:56

http://reply.papertrans.cn/47/4654/465373/465373_52.png

Recessive 发表于 2025-3-30 18:12:47

http://reply.papertrans.cn/47/4654/465373/465373_53.png

AGGER 发表于 2025-3-30 21:34:30

Yet Another Definition of Weak Collision Resistance and Its Analysiscurity notion of cryptographic hash functions. A collision of a hash function is a pair of different inputs which give the same output. In the new definition, weak collision resistance means that the probability of failing to find a collision is not negligible. This weak collision resistance is then

报复 发表于 2025-3-31 01:31:59

http://reply.papertrans.cn/47/4654/465373/465373_55.png

LARK 发表于 2025-3-31 07:13:16

http://reply.papertrans.cn/47/4654/465373/465373_56.png

Flu表流动 发表于 2025-3-31 11:35:00

http://reply.papertrans.cn/47/4654/465373/465373_57.png

财主 发表于 2025-3-31 14:12:17

http://reply.papertrans.cn/47/4654/465373/465373_58.png

INCH 发表于 2025-3-31 20:37:59

Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansionpose a new Frobenius expansion method for hyperelliptic curves that have efficiently computable endomorphisms used in Park, Jeong and Lim . When our method is applied to scalar multiplication for hyperelliptic curves, the number of divisor doublings in a scalar multiplication is reduced to a quar

Insul岛 发表于 2025-3-31 22:40:51

http://reply.papertrans.cn/47/4654/465373/465373_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Information Security and Cryptology - ICISC 2003; 6th International Co Jong-In Lim,Dong-Hoon Lee Conference proceedings 2004 Springer-Verla