不友善 发表于 2025-3-21 17:36:19

书目名称Selected Areas in Cryptography影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0864143<br><br>        <br><br>书目名称Selected Areas in Cryptography影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0864143<br><br>        <br><br>书目名称Selected Areas in Cryptography网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0864143<br><br>        <br><br>书目名称Selected Areas in Cryptography网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0864143<br><br>        <br><br>书目名称Selected Areas in Cryptography被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0864143<br><br>        <br><br>书目名称Selected Areas in Cryptography被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0864143<br><br>        <br><br>书目名称Selected Areas in Cryptography年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0864143<br><br>        <br><br>书目名称Selected Areas in Cryptography年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0864143<br><br>        <br><br>书目名称Selected Areas in Cryptography读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0864143<br><br>        <br><br>书目名称Selected Areas in Cryptography读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0864143<br><br>        <br><br>

狂怒 发表于 2025-3-21 22:59:02

http://reply.papertrans.cn/87/8642/864143/864143_2.png

Custodian 发表于 2025-3-22 04:27:54

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/s/image/864143.jpg

adroit 发表于 2025-3-22 07:32:10

http://reply.papertrans.cn/87/8642/864143/864143_4.png

detach 发表于 2025-3-22 11:24:55

http://reply.papertrans.cn/87/8642/864143/864143_5.png

BABY 发表于 2025-3-22 16:12:21

http://reply.papertrans.cn/87/8642/864143/864143_6.png

accessory 发表于 2025-3-22 20:29:55

http://reply.papertrans.cn/87/8642/864143/864143_7.png

暂停,间歇 发表于 2025-3-22 23:04:53

http://reply.papertrans.cn/87/8642/864143/864143_8.png

chlorosis 发表于 2025-3-23 02:12:47

Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 .-224 and .-384 with complexity 2. and close to 2., respectively. We implemented the attacks and provide examples of appropriate pairs of .,. values. We also provide possible configurations which may give collisions for step-reduced and full ..

压倒 发表于 2025-3-23 05:46:50

http://reply.papertrans.cn/87/8642/864143/864143_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Selected Areas in Cryptography; 16th International W Michael J. Jacobson,Vincent Rijmen,Reihaneh Safavi Conference proceedings 2009 Springe