横条 发表于 2025-3-25 03:42:27
A Proposal of a New Public Key Cryptosystem Using Matrices over a Ringem is similar to GGH(O. Goldreich, S. Goldwasser, and S. Halevi) cryptosystem but the attack which breaks the GGH system is not applicable to ours. The security of the new construction is based on the computational difficulty of integer factorizations.inveigh 发表于 2025-3-25 10:47:21
http://reply.papertrans.cn/47/4655/465404/465404_22.png愚笨 发表于 2025-3-25 15:40:39
http://reply.papertrans.cn/47/4655/465404/465404_23.pngCommon-Migraine 发表于 2025-3-25 18:37:15
http://reply.papertrans.cn/47/4655/465404/465404_24.pngREP 发表于 2025-3-25 20:21:06
http://reply.papertrans.cn/47/4655/465404/465404_25.pngBILE 发表于 2025-3-26 00:19:35
http://reply.papertrans.cn/47/4655/465404/465404_26.png不理会 发表于 2025-3-26 05:48:27
An Implementation of Bitsliced DES on the Pentium MMXTM Processorplementation specifics are discussed and comparisons made with an optimised C-coded DES implementation and an assembly language DES implementation. This paper sets the scene for future research of the inter-relation between design and implementation of the newer 128-bit symmetric block ciphers.absorbed 发表于 2025-3-26 12:14:03
Securing Large E-Commerce Networks Commerce (E-commerce). To fulfil the future requirements of E-commerce the CoCs need a secure communication channel between each other and the ability to ensure electronic documents of customers to be verified by any third party. In this paper we present a new Trusted Third Party (TTP) service whicauxiliary 发表于 2025-3-26 16:06:24
Passive Entities: A Strategy for Electronic Payment Designchemes are designed so that the bank is off-line during the actual payment between the customer and the merchant. This paper introduces the concept of passive entities which allows the protocol designer to allocate the level of processing required by an entity during a particular phase of the paymenchondromalacia 发表于 2025-3-26 20:16:25
http://reply.papertrans.cn/47/4655/465404/465404_30.png