標(biāo)題: Titlebook: Cryptography and Computational Number Theory; Kwok-Yan Lam,Igor Shparlinski,Chaoping Xing Conference proceedings 2001 Springer Basel AG 20 [打印本頁(yè)] 作者: PEL 時(shí)間: 2025-3-21 20:05
書目名稱Cryptography and Computational Number Theory影響因子(影響力)
書目名稱Cryptography and Computational Number Theory影響因子(影響力)學(xué)科排名
書目名稱Cryptography and Computational Number Theory網(wǎng)絡(luò)公開(kāi)度
書目名稱Cryptography and Computational Number Theory網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Cryptography and Computational Number Theory被引頻次
書目名稱Cryptography and Computational Number Theory被引頻次學(xué)科排名
書目名稱Cryptography and Computational Number Theory年度引用
書目名稱Cryptography and Computational Number Theory年度引用學(xué)科排名
書目名稱Cryptography and Computational Number Theory讀者反饋
書目名稱Cryptography and Computational Number Theory讀者反饋學(xué)科排名
作者: Cantankerous 時(shí)間: 2025-3-21 20:18
978-3-0348-9507-1Springer Basel AG 2001作者: Inflated 時(shí)間: 2025-3-22 03:30
Small Values of the Carmichael Function and Cryptographic Applicationswer generator of pseudorandom numbers. Namely, we show rigorously that almost all randomly selected RSA moduli are safe against the so-called cycling attack and we also provide some arguments in support of the reliability of the timed-release crypto scheme, which has recently been proposed by R. L. Rivest, A. Shamir and D. A. Wagner.作者: 單獨(dú) 時(shí)間: 2025-3-22 07:16
A Survey of Divide and Conquer Attacks on Certain Irregularly Clocked Stream Cipherse resistance against the conventional correlation attacks. This paper presents a survey of recent attacks, including correlation attacks, on several such keystream generators. These results demonstrate that despite the use of irregular clocking, such generators may still be vulnerable to certain divide and conquer attacks.作者: Certainty 時(shí)間: 2025-3-22 12:17
,Self Insurance in Workers’ Compensation,In this paper we study the relation between the dimension of a parametric variety and the number of parameters. We present an algorithm to reparameterize a variety in order to obtain a parameterization where the number of parameters equals the dimension of the variety.作者: Pericarditis 時(shí)間: 2025-3-22 15:20 作者: Pericarditis 時(shí)間: 2025-3-22 20:13
Soo-Joong Ghim,Yong-Ik Yoon,Ilkyeun RaIn this report, we discuss Hansen-Mullen’s conjecture on the distributions of primitive polynomials over finite field in two cases: 1). second coefficient and odd characteristic; 2). second coefficient and even characteristic.作者: 大暴雨 時(shí)間: 2025-3-22 21:32 作者: 左右連貫 時(shí)間: 2025-3-23 04:25
On Using Conceptual Modeling for OntologiesLet . where . is a prime not dividing .. We show how a special class of functions . : ... can be used to help obtain . given .. The requirements of . are that it be non-trivial and that . (.) = . (. mod .). Such a function does not “see” .. Hence the name ..作者: nugatory 時(shí)間: 2025-3-23 08:02
Web Information Exchange Diagrams for UMLWe survey some recent constructions of various sequences based on algebraic curves over finite fields.作者: GLOOM 時(shí)間: 2025-3-23 12:38 作者: Fissure 時(shí)間: 2025-3-23 16:10 作者: 飾帶 時(shí)間: 2025-3-23 20:16 作者: Ringworm 時(shí)間: 2025-3-24 02:05
The Distribution of the Quadratic Symbol in Function Fields and a Faster Mathematical Stream CipherWe present a stream cipher based on mathematical considerations which is much faster then many other mathematical ciphers. Its security is based on the uniformity of the distribution of the quadratic symbol in function fields.作者: 向宇宙 時(shí)間: 2025-3-24 02:36 作者: 緯線 時(shí)間: 2025-3-24 09:09 作者: Conscientious 時(shí)間: 2025-3-24 11:01 作者: 省略 時(shí)間: 2025-3-24 15:15
Peter Haase,Sudhir Agarwal,York Surewer generator of pseudorandom numbers. Namely, we show rigorously that almost all randomly selected RSA moduli are safe against the so-called cycling attack and we also provide some arguments in support of the reliability of the timed-release crypto scheme, which has recently been proposed by R. L. Rivest, A. Shamir and D. A. Wagner.作者: 乳白光 時(shí)間: 2025-3-24 21:34 作者: padding 時(shí)間: 2025-3-25 00:25 作者: correspondent 時(shí)間: 2025-3-25 04:32 作者: slow-wave-sleep 時(shí)間: 2025-3-25 10:48 作者: Indelible 時(shí)間: 2025-3-25 14:50
Yeonho Hong,Suk-ki,Woochun Jun,Le Gruenwaldof calculating the density of the primes r for which ind.(.) and . are coprime; this is the condition that the Gauβ period in F ., defined by these data be normal over F.. We assume the Generalized Riemann Hypothesis and calculate a formula for this density for all . and .. We prove unconditionally 作者: foodstuff 時(shí)間: 2025-3-25 16:12 作者: ETCH 時(shí)間: 2025-3-25 23:37 作者: Inelasticity 時(shí)間: 2025-3-26 01:31 作者: GLIDE 時(shí)間: 2025-3-26 06:32 作者: BILIO 時(shí)間: 2025-3-26 09:38 作者: 多產(chǎn)子 時(shí)間: 2025-3-26 16:39
Interfaces of Cu-Chalcopyrites,e resistance against the conventional correlation attacks. This paper presents a survey of recent attacks, including correlation attacks, on several such keystream generators. These results demonstrate that despite the use of irregular clocking, such generators may still be vulnerable to certain div作者: invade 時(shí)間: 2025-3-26 17:58
J.D Cohen,J.T Heath,W.N Shafarmanyptography scheme (VCS) for a set . of n participants encodes a secret image into n shadow images called shares each of which is given to a distinct participant. Certain . subsets of participants can recover the secret image, whereas . subsets of participants have no information on the secret image.作者: fringe 時(shí)間: 2025-3-27 00:51 作者: 雜色 時(shí)間: 2025-3-27 03:23
Counting the Number of Points on Affine Diagonal CurvesEvans and Williams [1] is to express the number of points in terms of generalized Jacobi sums, then to relate the Jacobi sums .(..,..) to cyclotomic numbers. In this article we present the direct elementary method for the number of points on the affine curves .. + .. = . over finite fields in terms 作者: Conjuction 時(shí)間: 2025-3-27 08:32 作者: sleep-spindles 時(shí)間: 2025-3-27 10:13 作者: boisterous 時(shí)間: 2025-3-27 14:33 作者: Exaggerate 時(shí)間: 2025-3-27 20:02 作者: 美色花錢 時(shí)間: 2025-3-28 00:52
Algorithms for Generating, Testing and Proving Primes: A Surveyf primality tests of theoretical or practical relevance, the focus is on criteria for practical use..We give a new model for sources producing prime numbers with biased distributions and use it for measuring the security of biases against unknown attacks (adapted solutions to the discrete logarithm 作者: 熱情的我 時(shí)間: 2025-3-28 05:12
The Hermite-Serret Algorithm and 122 + 332uares, given (or having already found) a square root ., say, of -1 modulo n. In brief, one applies the Euclidean algorithm to n and ., stopping at the first pair . and . of remainders that are smaller than . Then, lo! it happens that . = .. + ... Naturally, square roots of -1 properly different from作者: 割讓 時(shí)間: 2025-3-28 09:42 作者: 上流社會(huì) 時(shí)間: 2025-3-28 12:18 作者: Infinitesimal 時(shí)間: 2025-3-28 17:48 作者: 知識(shí) 時(shí)間: 2025-3-28 19:19
Authentication-Myths and Misconceptionsof good design strategies, and to a lack of verification tools. This paper tells the story of entity authentication arguing that clarity is more important than precision, and that formal methods sometimes even add to the confusion about the meaning of ‘a(chǎn)uthentication’. Verifying claimed identities t作者: 哺乳動(dòng)物 時(shí)間: 2025-3-29 00:28 作者: CRUDE 時(shí)間: 2025-3-29 07:05 作者: Neuropeptides 時(shí)間: 2025-3-29 08:41 作者: Meditate 時(shí)間: 2025-3-29 11:55
Mengchi Liu,Guoren Wang,Tok Wang Lingrtain remainders in the Euclidean algorithm applied to . and some square root modulo . yield the representation. My story is for our mild amusement, and provides a nice and easily comprehended story to tell our students作者: CURL 時(shí)間: 2025-3-29 18:10 作者: 遵循的規(guī)范 時(shí)間: 2025-3-29 23:33
Conference proceedings 2001d and successfully achieved that the meeting would encourage and stimulate further research in information and computer security as well as in the design and implementation of number theoretic cryptosystems and other related areas. Another goal of the meeting was to stimulate collaboration and more 作者: laxative 時(shí)間: 2025-3-30 00:09
2297-0576 in Singapore during the week of November 22-26, 1999. The workshop was organized by the Centre for Systems Security of the Na- tional University of Singapore. We gratefully acknowledge the financial support from the Singapore National Science and Technology Board under the grant num- ber RP960668/M.作者: Neutropenia 時(shí)間: 2025-3-30 06:10 作者: cipher 時(shí)間: 2025-3-30 10:31 作者: 織物 時(shí)間: 2025-3-30 15:32 作者: floodgate 時(shí)間: 2025-3-30 18:22 作者: 不透明性 時(shí)間: 2025-3-30 23:00 作者: Congregate 時(shí)間: 2025-3-31 02:09 作者: 友好 時(shí)間: 2025-3-31 06:07 作者: 不可比擬 時(shí)間: 2025-3-31 09:54 作者: 幼稚 時(shí)間: 2025-3-31 15:58
Conference proceedings 2001re during the week of November 22-26, 1999. The workshop was organized by the Centre for Systems Security of the Na- tional University of Singapore. We gratefully acknowledge the financial support from the Singapore National Science and Technology Board under the grant num- ber RP960668/M. The idea