用户名  找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Arithmetic of Finite Fields; Second International Joachim Gathen,José Luis Imaña,Çetin Kaya Koç Conference proceedings 2008 Springer-Verlag

[复制链接]
楼主: 审美家
发表于 2025-3-28 15:13:15 | 显示全部楼层
Basics of Expert System Technology,we focused our efforts on efficient computation of primitive elements and modular roots. Our optimizations involve some heuristic methods that use “modular composition” and the generalized Tonelli-Shanks algorithm. Other open and free systems such as GP/Pari do not include in their standard packages
发表于 2025-3-28 19:34:25 | 显示全部楼层
Recording, Evaluating and Testing Controlsted efficiently without using a pre-computational phase. We extend the set of moduli that is recommended by Standards for Efficient Cryptography (SEC) by defining two distinct sets for which either Barrett or Montgomery reduction is applicable. As the proposed algorithm is very suitable for a fast m
发表于 2025-3-29 00:57:01 | 显示全部楼层
Recording, Evaluating and Testing Controlsch is known as the shifted polynomial basis, has been introduced. Current research shows that this new basis provides better performance in designing bit-parallel and subquadratic space complexity multipliers over binary extension fields. In this paper, we study digit-serial multiplication algorithm
发表于 2025-3-29 05:28:46 | 显示全部楼层
发表于 2025-3-29 11:03:41 | 显示全部楼层
Dimitris N. Chorafas,Heinrich Steinmanneration, finite field inversion, power mappings and heuristic techniques. From these techniques, the use of finite field inversion in the construction of an S-box is so popular because it presents good cryptographic properties. On the other hand, while S-boxes such as AES, Shark, Square and Hierocry
发表于 2025-3-29 15:20:46 | 显示全部楼层
发表于 2025-3-29 19:24:30 | 显示全部楼层
发表于 2025-3-29 19:51:48 | 显示全部楼层
Rin-ichiro Taniguchi,Eiji Kawaguchiest field size for which linear network coding is feasible. Second we derive improved estimates on the success probability of random linear network coding. These estimates take into account which monomials occur in the support of the determinant of the product of Edmonds matrices. Therefore we final
发表于 2025-3-30 02:28:24 | 显示全部楼层
发表于 2025-3-30 07:12:44 | 显示全部楼层
Expert Systems in Engineering Applications that takes . binary inputs whose image is a binary .-tuple; therefore it is represented as .. One of the most important cryptographic applications is the case . = ., thus the S-box may be viewed as a function over .. We show that certain classes of functions over . do not possess a cryptographic pr
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-21 22:43
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表