找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Number-Theoretic Methods in Cryptology; First International Jerzy Kaczorowski,Josef Pieprzyk,Jacek Pomyka?a Conference proceedings 2018 Sp

[復(fù)制鏈接]
樓主: POL
21#
發(fā)表于 2025-3-25 04:00:34 | 只看該作者
22#
發(fā)表于 2025-3-25 08:12:38 | 只看該作者
Explicit Formula for Gram-Schmidt Vectors in LLL with Deep Insertions and Its Applications and LLL with deep insertions (DeepLLL). In LLL and DeepLLL, at every time to replace a lattice basis, we need to recompute the Gram-Schmidt orthogonalization (GSO) for the new basis. Compared with LLL, the form of the new GSO vectors is complicated in DeepLLL, and no formula has been known. In this
23#
發(fā)表于 2025-3-25 14:37:08 | 只看該作者
24#
發(fā)表于 2025-3-25 19:42:40 | 只看該作者
25#
發(fā)表于 2025-3-25 20:17:09 | 只看該作者
The Measures of Pseudorandomness and the NIST Tests many papers and many constructions have been given along these lines. In this paper the connection between the new measures and the NIST tests is analyzed. It is shown that finite binary sequences possessing strong pseudorandom properties in terms of these new measures usually also pass or nearly p
26#
發(fā)表于 2025-3-26 04:11:44 | 只看該作者
On the Cross-Combined Measure of Families of Binary Lattices and Sequences of binary lattices with optimal or nearly optimal cross-combined measures are presented. These results are also strongly related to the one-dimensional case: An easy method is shown obtaining strong constructions of families of binary sequences with nearly optimal cross-correlation measures based o
27#
發(fā)表于 2025-3-26 05:23:46 | 只看該作者
28#
發(fā)表于 2025-3-26 11:36:37 | 只看該作者
Generation and Implementation of Cryptographically Strong Elliptic Curvese elliptic curves have to satisfy, together with their justification and some relevant examples of elliptic curves. We implemented modular arithmetic in a finite field, the operations on an elliptic curve and the basic cryptographic protocols.
29#
發(fā)表于 2025-3-26 15:17:43 | 只看該作者
A Novel RSA-Like Cryptosystem Based on a Generalization of the Rédei Rational Functionsrational functions. We then exploit these results to construct a novel RSA-like scheme that is more secure than RSA in broadcast applications. Moreover, our scheme is robust against the Wiener attack and against other kind of attacks that exploit the knowledge of a linear relation occurring between two plaintexts.
30#
發(fā)表于 2025-3-26 20:16:07 | 只看該作者
Detection of Primes in the Set of?Residues of Divisors of a Given Numberconditions and show that there are plenty of such numbers. One interesting feature of the proof is that it relies on additive combinatorics. We also give some application of this result to algorithmic number theory.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-9 11:29
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
台南市| 叶城县| 泽库县| 海兴县| 景谷| 阜阳市| 呼和浩特市| 潞西市| 东至县| 文安县| 木里| 双桥区| 文昌市| 郁南县| 贺州市| 高碑店市| 武安市| 德阳市| 台南县| 汝州市| 凤山市| 济阳县| 锡林郭勒盟| 潮安县| 文化| 莲花县| 扎囊县| 定州市| 隆回县| 嵩明县| 井陉县| 长垣县| 景德镇市| 项城市| 珠海市| 南充市| 吉木乃县| 庐江县| 河池市| 休宁县| 南澳县|