军事学 >>> 军事学
搜索结果: 1-14 共查到军事学 Cryptographic Applications相关记录14条 . 查询时间(0.079 秒)
In this paper we study structured linear block codes, starting from well known examples and generalizing them to a wide class of codes that we call reproducible codes. These codes have the property th...
Cryptographic primitives from coding theory are some of the most promising candidates for NIST's Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques ...
In this paper, we propose new classes of trapdoor functions to solve the closest vector problem in lattices. Specifically, we construct lattices based on properties of polynomials for which the closes...
We draw a new connection between Coppersmith's method for finding small solutions to polynomial congruences modulo integers and the capacity theory of adelic subsets of algebraic curves. Coppersmith's...
Walsh-Hadamard transform is used in a wide variety of scientific and engineering applications, including bent functions and cryptanalytic optimization techniques in cryptography. In linear cryptanalys...
In this paper, we investigate matrices acting on finite commutative groups and rings; in fact, we study modules on ring of matrices over Z_N and also modules over the ring (F_2^t,\oplus,\land); these ...
We propose generic declarative definitions of individual and collective trust relations between interacting agents and agent collections, and trust domains of trust-related agents in distributed syste...
We propose generic declarative definitions of the concepts of weak and strong trust relations between interacting agents, and trust domains of trust-related agents in distributed or multi-agent system...
Recently, the C¡ signature scheme has been completely bro- ken by Dubois et al. [2, 3]. As a consequence, the security of SFLASH and other multivariate public key systems have been impaired. T...
As our first contribution, we give an explicit construction of an extended access structure 􀀀0 starting from a vector space access structure 􀀀, and we prove that 􀀀0 is als...
This paper deals with products of moderate-size primes, familiarly known as smooth numbers. Smooth numbers play an crucial role in information theory, signal processing and cryptography. We present...
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribut...
A digit-serial, multiplier-accumulator based cryptographic co-processor architecture is proposed, similar to fix-point DSP's with enhance-ments, supporting long modular arithmetic and general computat...
The algebraic method for stream-cipher key recovering was developed in [5]. The essence of this method is in solving the system of nonlinear equations which are the simplified consequences of the en...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...