找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cryptography and Coding; 13th IMA Internation Liqun Chen Conference proceedings 2011 Springer-Verlag GmbH Berlin Heidelberg 2011 anonymous

[復制鏈接]
樓主: affront
41#
發(fā)表于 2025-3-28 16:03:08 | 只看該作者
42#
發(fā)表于 2025-3-28 19:17:43 | 只看該作者
Julia Barbar,Rabia Naguib,Maysaa AbuHilal in coding theory. We also provide results about the relative frequencies of the different cases. We formulate a conjecture regarding the minimum number of errors needed for reducing the period at all. Finally we apply our results to the LFSR components of several well known stream ciphers.
43#
發(fā)表于 2025-3-29 01:51:40 | 只看該作者
44#
發(fā)表于 2025-3-29 05:02:25 | 只看該作者
45#
發(fā)表于 2025-3-29 10:33:56 | 只看該作者
On the Stability of m-Sequences in coding theory. We also provide results about the relative frequencies of the different cases. We formulate a conjecture regarding the minimum number of errors needed for reducing the period at all. Finally we apply our results to the LFSR components of several well known stream ciphers.
46#
發(fā)表于 2025-3-29 15:05:45 | 只看該作者
On Constructing Homomorphic Encryption Schemes from Coding Theory fresh encryptions only, and cannot be combined with the bootstrapping technique. We argue why such schemes are nonetheless useful in certain application scenarios and discuss possible directions on how to overcome these issues.
47#
發(fā)表于 2025-3-29 15:54:13 | 只看該作者
On the Triple-Error-Correcting Cyclic Codes with Zero Set {1, 2,?+?1, 2,?+?1}ment shows that these codes are not equivalent to the 3-error-correcting BCH code in general. We also study the Schaub algorithm which determines a lower bound of the minimum distance of a cyclic code. We introduce a pruning strategy to improve the Schaub algorithm. Finally we study the cryptographi
48#
發(fā)表于 2025-3-29 22:22:49 | 只看該作者
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption cheme and a wildcard-applicable HIBE (or simply WIBE) scheme. We utilize our “half-baked” methodology to transform an AHIBE scheme into a WIBE scheme, and a well known linear-splitting methodology to make our scheme anonymous. Finally, we show as one of applications of our CP-dHVE scheme a public-ke
49#
發(fā)表于 2025-3-30 02:13:32 | 只看該作者
50#
發(fā)表于 2025-3-30 07:51:55 | 只看該作者
 關于派博傳思  派博傳思旗下網站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網 吾愛論文網 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經驗總結 SCIENCEGARD IMPACTFACTOR 派博系數 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網安備110108008328) GMT+8, 2025-10-7 03:36
Copyright © 2001-2015 派博傳思   京公網安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
桓台县| 吉林省| 盐山县| 通海县| 余干县| 岳普湖县| 贵德县| 富源县| 佛坪县| 仁化县| 车致| 濉溪县| 乌恰县| 静安区| 江城| 陈巴尔虎旗| 芷江| 长泰县| 灵武市| 南汇区| 漳浦县| 济宁市| 徐闻县| 麻城市| 高安市| 阳春市| 平潭县| 辉县市| 无棣县| 南丰县| 上虞市| 常山县| 岳西县| 吴川市| 大关县| 安丘市| 龙山县| 邯郸市| 渝北区| 芜湖县| 固原市|