Watemelon 发表于 2025-3-23 19:58:01

http://reply.papertrans.cn/47/4658/465740/465740_13.png

浪费物质 发表于 2025-3-24 01:50:01

http://reply.papertrans.cn/47/4658/465740/465740_14.png

协迫 发表于 2025-3-24 02:49:07

Simon R. Blackburn,Keith M. Martin,Maura B. Paterson,Douglas R. Stinsonf double ?bration transforms, and we indicate the connection to the variation of Hodge structure. Finally, we work out detailed local descriptions of the relevant full Barlet cycle spaces. Cycle space theory is a basic chapter in complex analysis. Since the 1960s its importance has been underlined b

Enliven 发表于 2025-3-24 08:29:11

http://reply.papertrans.cn/47/4658/465740/465740_16.png

temperate 发表于 2025-3-24 13:55:42

http://reply.papertrans.cn/47/4658/465740/465740_17.png

Barter 发表于 2025-3-24 17:54:51

http://reply.papertrans.cn/47/4658/465740/465740_18.png

acrobat 发表于 2025-3-24 22:56:47

http://reply.papertrans.cn/47/4658/465740/465740_19.png

Microgram 发表于 2025-3-25 03:12:24

http://reply.papertrans.cn/47/4658/465740/465740_20.png

遗留之物 发表于 2025-3-25 05:14:39

Upper Bounds for Set Systems with the Identifiable Parent PropertyWe derive upper bounds on the size of set systems having the .-identifiable parent property (.-IPP) and the .-traceability property (.-TA).

材料等 发表于 2025-3-25 11:22:24

Oblivious Transfer Based on the McEliece AssumptionsWe implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliece cryptosystem: the hardness of decoding random binary linear codes, and the difficulty of distinguishing a permuted generating matrix of Goppa codes from a random matrix. To our knowledge this is the first OT reduction to these problems only.
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Information Theoretic Security; Third International Reihaneh Safavi-Naini Conference proceedings 2008 Springer-Verlag Berlin Heidelberg 20