找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Advances in Cryptology - CRYPTO ‘90; Proceedings Alfred J. Menezes,Scott A. Vanstone Conference proceedings 1991 Springer-Verlag Berlin Hei

[复制链接]
楼主: VEER
发表于 2025-3-30 08:51:23 | 显示全部楼层
https://doi.org/10.1007/978-3-030-67742-8r finite fields. This paper presents the results of implementations of several linear algebra algorithms. It shows that very large sparse systems can be solved efficiently by using combinations of structured Gaussian elimination and the conjugate gradient, Lanczos, and Wiedemann methods.
发表于 2025-3-30 12:40:32 | 显示全部楼层
Amit Agarwal,Ranil Fernando,Roma Pradhanlass group of imaginary quadratic orders. Subsequently, in [.] and [.] a subexponential algorithm for computing those class groups was presented and it was shown how to use this algorithm and the index-calculus method to calculate discrete logarithms.
发表于 2025-3-30 20:30:45 | 显示全部楼层
发表于 2025-3-30 21:44:49 | 显示全部楼层
Anne Fleur van Veenstra,Tijs van den Broekavesdroppers relay questions and answers or in which the prover helps deliberately an impersonator have been described [.]. In this paper a solution against such frauds is given and (based on some physical assumptions) it is proved that the solution protects against the real-time attacks.
发表于 2025-3-31 02:31:54 | 显示全部楼层
发表于 2025-3-31 06:05:37 | 显示全部楼层
AC, Splice, and Mechanical Losses,00 pairs of 64 bit plaintext blocks. The difference (bitwise xor) between the two blocks of each pair is equal to an appropriately selected constant. We first state that some differential statistics for intermediate values of the data randomizer are non uniform and independent of the encryption key.
发表于 2025-3-31 12:45:20 | 显示全部楼层
Introduction-Who Should Use this Book,esult much later [.]). One of his ideas was that it would be possible to use a stream of polarized photons to transmit two messages in a way that would make only one of them readable at the receiver’s choosing. This notion, which he called “multiplexing”, is remarkably similar to the “one-out-of-two
发表于 2025-3-31 15:43:39 | 显示全部楼层
Introduction-Who Should Use this Book,.-party protocol for a function of . bits is efficient if it uses a constant number of rounds of communication and a total number of message bits that is polynomial in max(.). We show that . function has an efficient protocol that achieves (. log .)/. resilience, Ours is the first secure multiparty
发表于 2025-3-31 20:54:58 | 显示全部楼层
Fate Decisions of CD4+ T Cells,atural and powerful primitive for the implementation of bit commitment schemes. It is a generalization of the one-way group homomorphism [.], which was not powerful enough to capture the bit commitment scheme based on graph isomorphism [.]. It provides a unified theory for all the known bit commitme
发表于 2025-4-1 00:00:05 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-3 15:24
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表