DEBUT 发表于 2025-3-21 16:58:22

书目名称Information Security and Cryptology - ICISC 2001影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465396<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2001影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465396<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2001网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465396<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2001网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465396<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2001被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465396<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2001被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465396<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2001年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465396<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2001年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465396<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2001读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465396<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2001读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465396<br><br>        <br><br>

确定 发表于 2025-3-21 21:05:33

http://reply.papertrans.cn/47/4654/465396/465396_2.png

abstemious 发表于 2025-3-22 03:56:36

http://reply.papertrans.cn/47/4654/465396/465396_3.png

Bureaucracy 发表于 2025-3-22 07:45:05

http://reply.papertrans.cn/47/4654/465396/465396_4.png

persistence 发表于 2025-3-22 10:18:01

http://reply.papertrans.cn/47/4654/465396/465396_5.png

Lasting 发表于 2025-3-22 16:18:06

Improved Impossible Differential Cryptanalysis of Rijndael and Crypton,of 6-round. That is, we will consider one round before the impossible differential and one more round after. The complexity of the proposed attack is bigger than that of the Square attack, but still less than that of the exhaustive search.

MAPLE 发表于 2025-3-22 18:27:55

http://reply.papertrans.cn/47/4654/465396/465396_7.png

entitle 发表于 2025-3-22 21:57:06

http://reply.papertrans.cn/47/4654/465396/465396_8.png

kidney 发表于 2025-3-23 04:04:04

Copyright Protection of Object-Oriented Software, variants of the source code. The third level uses transition function that can be used to generate copies with different functionalities. Generic watermarking schemes were presented and their security discussed.

起皱纹 发表于 2025-3-23 07:14:43

http://reply.papertrans.cn/47/4654/465396/465396_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology - ICISC 2001; 4th International Co Kwangjo Kim Conference proceedings 2002 Springer-Verlag Berlin Heide