找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes; 18th International S Maria Bras-Amorós,Tom Høholdt Conference proceedings

[复制链接]
楼主: deliberate
发表于 2025-3-23 13:44:34 | 显示全部楼层
Word Oriented Cascade Jump ,−LFSRconstructions make use of special word oriented .−LFSRs, which can be efficiently implemented on modern CPU and only require few memory. Experimental results show that one type of efficient word oriented cascade jump .−LFSRs can be used as building blocks for software oriented stream cipher.
发表于 2025-3-23 15:31:19 | 显示全部楼层
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKEed in the above paper; to our best knowledge, this is the first example of length-preserving hybrid encryption; 2) postquantum deterministic encryption (using the IND-CPA variant of code-based McEliece PKE) which enjoys a simplified construction, where the public key is re-used as a hash function.
发表于 2025-3-23 21:34:31 | 显示全部楼层
发表于 2025-3-24 01:59:29 | 显示全部楼层
On Some Sequences of the Secret Pseudo-random Index , in RC4 Key Schedulingresults on the probability and the number of such sequences. As an application, we explain a new secret key recovery algorithm that can recover a 16 bytes secret key with a success probability of 0.1409. Our strategy has high time complexity at this point and requires further improvement to be feasible in practice.
发表于 2025-3-24 03:10:35 | 显示全部楼层
发表于 2025-3-24 07:02:56 | 显示全部楼层
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensionsonditional user anonymity against a semi-honest server. If the pre-computation is allowed, the computation cost of the . protocol is the same as the well-known Diffie-Hellman protocol! In addition, we extend the . protocol in two ways.
发表于 2025-3-24 13:38:01 | 显示全部楼层
发表于 2025-3-24 17:09:29 | 显示全部楼层
0302-9743 fields, algebraic geometry codes; algebra: rings and fields, polynomials, permutations, lattices; cryptography: cryptanalysis and complexity; computational algebra: algebraic algorithms and transforms; sequences and boolean functions.978-3-642-02180-0978-3-642-02181-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
发表于 2025-3-24 19:09:49 | 显示全部楼层
Energy Resources in East African-abelian group of matrices is used. The primary advantadge of this scheme is that no prime numbers are used and the efficiency is guaranteed by the use of a quick exponentiation algorithm for this group of matrices.
发表于 2025-3-24 23:52:26 | 显示全部楼层
Energy Resources in East Africaonditional user anonymity against a semi-honest server. If the pre-computation is allowed, the computation cost of the . protocol is the same as the well-known Diffie-Hellman protocol! In addition, we extend the . protocol in two ways.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-28 00:48
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表