找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Number-Theoretic Methods in Cryptology; First International Jerzy Kaczorowski,Josef Pieprzyk,Jacek Pomykała Conference proceedings 2018 Sp

[复制链接]
楼主: POL
发表于 2025-3-25 04:00:34 | 显示全部楼层
发表于 2025-3-25 08:12:38 | 显示全部楼层
Explicit Formula for Gram-Schmidt Vectors in LLL with Deep Insertions and Its Applications and LLL with deep insertions (DeepLLL). In LLL and DeepLLL, at every time to replace a lattice basis, we need to recompute the Gram-Schmidt orthogonalization (GSO) for the new basis. Compared with LLL, the form of the new GSO vectors is complicated in DeepLLL, and no formula has been known. In this
发表于 2025-3-25 14:37:08 | 显示全部楼层
发表于 2025-3-25 19:42:40 | 显示全部楼层
发表于 2025-3-25 20:17:09 | 显示全部楼层
The Measures of Pseudorandomness and the NIST Tests many papers and many constructions have been given along these lines. In this paper the connection between the new measures and the NIST tests is analyzed. It is shown that finite binary sequences possessing strong pseudorandom properties in terms of these new measures usually also pass or nearly p
发表于 2025-3-26 04:11:44 | 显示全部楼层
On the Cross-Combined Measure of Families of Binary Lattices and Sequences of binary lattices with optimal or nearly optimal cross-combined measures are presented. These results are also strongly related to the one-dimensional case: An easy method is shown obtaining strong constructions of families of binary sequences with nearly optimal cross-correlation measures based o
发表于 2025-3-26 05:23:46 | 显示全部楼层
发表于 2025-3-26 11:36:37 | 显示全部楼层
Generation and Implementation of Cryptographically Strong Elliptic Curvese elliptic curves have to satisfy, together with their justification and some relevant examples of elliptic curves. We implemented modular arithmetic in a finite field, the operations on an elliptic curve and the basic cryptographic protocols.
发表于 2025-3-26 15:17:43 | 显示全部楼层
A Novel RSA-Like Cryptosystem Based on a Generalization of the Rédei Rational Functionsrational functions. We then exploit these results to construct a novel RSA-like scheme that is more secure than RSA in broadcast applications. Moreover, our scheme is robust against the Wiener attack and against other kind of attacks that exploit the knowledge of a linear relation occurring between two plaintexts.
发表于 2025-3-26 20:16:07 | 显示全部楼层
Detection of Primes in the Set of Residues of Divisors of a Given Numberconditions and show that there are plenty of such numbers. One interesting feature of the proof is that it relies on additive combinatorics. We also give some application of this result to algorithmic number theory.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-20 17:59
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表