Abeyance 发表于 2025-3-21 17:58:14
书目名称Information Security and Cryptology - ICISC 2014影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0465378<br><br> <br><br>书目名称Information Security and Cryptology - ICISC 2014影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0465378<br><br> <br><br>书目名称Information Security and Cryptology - ICISC 2014网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0465378<br><br> <br><br>书目名称Information Security and Cryptology - ICISC 2014网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0465378<br><br> <br><br>书目名称Information Security and Cryptology - ICISC 2014被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0465378<br><br> <br><br>书目名称Information Security and Cryptology - ICISC 2014被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0465378<br><br> <br><br>书目名称Information Security and Cryptology - ICISC 2014年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0465378<br><br> <br><br>书目名称Information Security and Cryptology - ICISC 2014年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0465378<br><br> <br><br>书目名称Information Security and Cryptology - ICISC 2014读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0465378<br><br> <br><br>书目名称Information Security and Cryptology - ICISC 2014读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0465378<br><br> <br><br>驾驶 发表于 2025-3-21 21:32:14
Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree , which . also plays a role of variable. In other words, this paper proposes an elliptic curve discrete logarithm on such a torsion group. After that, together with some example parameters, it is shown how to prepare such pairing–friendly elliptic curves.FAR 发表于 2025-3-22 01:36:07
http://reply.papertrans.cn/47/4654/465378/465378_3.png吹牛需要艺术 发表于 2025-3-22 04:41:34
Fault Analysis on SIMON Family of Lightweight Block Ciphersd key agrees with that based on theoretical results. We believe that this study gives new insight into the field of fault analysis because . has a property specific to non-linear functions in that it uses the . operation while not using a substitution box which most block ciphers employ.Climate 发表于 2025-3-22 09:05:37
http://reply.papertrans.cn/47/4654/465378/465378_5.png柔软 发表于 2025-3-22 16:33:41
http://reply.papertrans.cn/47/4654/465378/465378_6.png昏迷状态 发表于 2025-3-22 17:34:31
http://reply.papertrans.cn/47/4654/465378/465378_7.pngHot-Flash 发表于 2025-3-23 00:59:10
Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme. where . is the number of variables and . is the size of the base field. Here . is expected generally to be 1 and is confirmed in our tests. We also compare our attacks with Y. Hashimoto’s attack which is just published in PQCrypto 2014.成绩上升 发表于 2025-3-23 02:06:57
http://reply.papertrans.cn/47/4654/465378/465378_9.pngarcane 发表于 2025-3-23 08:25:00
A Clustering Approach for Privacy-Preserving in Social Networkserving considering both attribute and structure information. In particular, sensitive attributes are considered to resist re-identification attacks. Moreover, we define the entropy to measure capability of preserving sensitive attributes.