GRACE 发表于 2025-3-26 23:27:11

A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Cu.). We take curves of genus 3 and 6, designed by using 0.27-um CMOS gate array technology, and estimate the number of multiplication operations and the size and speed of hardware based on the proposed algorithm. It is shown that hardware for genus 6 curves computes an addition (resp. doubling) opera

fiscal 发表于 2025-3-27 04:02:35

http://reply.papertrans.cn/47/4654/465380/465380_32.png

有常识 发表于 2025-3-27 08:04:29

http://reply.papertrans.cn/47/4654/465380/465380_33.png

供过于求 发表于 2025-3-27 13:31:17

Correlation Properties of the Bluetooth Combinertance of this limitation is proved by showing that the Bluetooth stream cipher with 128 bit key can be broken in . steps given an output key stream segment of length .. We also show how the correlation properties of the .. combiner can be improved by making a small modification in the memory update function.

表主动 发表于 2025-3-27 15:53:12

http://reply.papertrans.cn/47/4654/465380/465380_35.png

我的巨大 发表于 2025-3-27 18:00:27

http://reply.papertrans.cn/47/4654/465380/465380_36.png

fatty-streak 发表于 2025-3-27 22:04:29

Secure Selection Protocolsg . protocol applications, which will eventually lead to better understanding and refinement of these applications. We present a proposal for a specialised selection protocol with anonymity as the security service. An area for its application is anonymous peer review, where no peer should know the identity of the reviewer.

免除责任 发表于 2025-3-28 02:59:57

A 2-Pass Authentication and Key Agreement Protocol for Mobile Communicationss 1.5-move protocol for air-interface of mobile systems. The paper outlines the new protocol, examines its various aspects, and compares them to those of other 2-pass protocols of the PACS and the 1.5-move protocol.

固定某物 发表于 2025-3-28 07:20:30

http://reply.papertrans.cn/47/4654/465380/465380_39.png

协定 发表于 2025-3-28 12:18:23

http://reply.papertrans.cn/47/4654/465380/465380_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology - ICISC‘99; Second International JooSeok Song Conference proceedings 2000 Springer-Verlag Berlin Heidel