找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cryptography and Coding; 13th IMA Internation Liqun Chen Conference proceedings 2011 Springer-Verlag GmbH Berlin Heidelberg 2011 anonymous

[復制鏈接]
樓主: affront
41#
發(fā)表于 2025-3-28 16:03:08 | 只看該作者
42#
發(fā)表于 2025-3-28 19:17:43 | 只看該作者
Julia Barbar,Rabia Naguib,Maysaa AbuHilal in coding theory. We also provide results about the relative frequencies of the different cases. We formulate a conjecture regarding the minimum number of errors needed for reducing the period at all. Finally we apply our results to the LFSR components of several well known stream ciphers.
43#
發(fā)表于 2025-3-29 01:51:40 | 只看該作者
44#
發(fā)表于 2025-3-29 05:02:25 | 只看該作者
45#
發(fā)表于 2025-3-29 10:33:56 | 只看該作者
On the Stability of m-Sequences in coding theory. We also provide results about the relative frequencies of the different cases. We formulate a conjecture regarding the minimum number of errors needed for reducing the period at all. Finally we apply our results to the LFSR components of several well known stream ciphers.
46#
發(fā)表于 2025-3-29 15:05:45 | 只看該作者
On Constructing Homomorphic Encryption Schemes from Coding Theory fresh encryptions only, and cannot be combined with the bootstrapping technique. We argue why such schemes are nonetheless useful in certain application scenarios and discuss possible directions on how to overcome these issues.
47#
發(fā)表于 2025-3-29 15:54:13 | 只看該作者
On the Triple-Error-Correcting Cyclic Codes with Zero Set {1, 2,?+?1, 2,?+?1}ment shows that these codes are not equivalent to the 3-error-correcting BCH code in general. We also study the Schaub algorithm which determines a lower bound of the minimum distance of a cyclic code. We introduce a pruning strategy to improve the Schaub algorithm. Finally we study the cryptographi
48#
發(fā)表于 2025-3-29 22:22:49 | 只看該作者
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption cheme and a wildcard-applicable HIBE (or simply WIBE) scheme. We utilize our “half-baked” methodology to transform an AHIBE scheme into a WIBE scheme, and a well known linear-splitting methodology to make our scheme anonymous. Finally, we show as one of applications of our CP-dHVE scheme a public-ke
49#
發(fā)表于 2025-3-30 02:13:32 | 只看該作者
50#
發(fā)表于 2025-3-30 07:51:55 | 只看該作者
 關于派博傳思  派博傳思旗下網站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網 吾愛論文網 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經驗總結 SCIENCEGARD IMPACTFACTOR 派博系數 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網安備110108008328) GMT+8, 2025-10-7 03:36
Copyright © 2001-2015 派博傳思   京公網安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
额敏县| 翼城县| 绿春县| 临沂市| 文昌市| 沙田区| 错那县| 红桥区| 黄山市| 勐海县| 长宁区| 崇州市| 琼中| 巫山县| 泗阳县| 成都市| 平罗县| 峡江县| 象州县| 大竹县| 山阳县| 苗栗县| 凉城县| 泰顺县| 双城市| 额济纳旗| 湖北省| 阜平县| 肥乡县| 巴林右旗| 隆昌县| 孝感市| 石家庄市| 牙克石市| 策勒县| 炉霍县| 九江县| 墨江| 沈丘县| 任丘市| 色达县|