Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …
Cryptography (ECC). EC is often used to improve the security of open communication …
Boolean functions for cryptography and coding theory
C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
Криптографические протоколы: основные свойства и уязвимости
АВ Черемушкин - Прикладная дискретная математика …, 2009 - cyberleninka.ru
В лекции рассматриваются основные понятия, связанные с криптографическими
протоколами, определяются их основные свойства и уязвимости. Приводятся примеры …
протоколами, определяются их основные свойства и уязвимости. Приводятся примеры …
[КНИГА][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
[КНИГА][B] The design of Rijndael
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Boolean Functions for Cryptography and Error-Correcting Codes.
C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …
insecure channel (a public channel such as the internet) in such a way that any other person …
[КНИГА][B] Cryptographic Boolean functions and applications
TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …
comprehensive reference for the use of Boolean functions in modern cryptography. While …
[КНИГА][B] Encyclopedia of cryptography and security
HCA Van Tilborg, S Jajodia - 2014 - books.google.com
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography
and Security brings the latest and most comprehensive coverage of the topic: Definitive …
and Security brings the latest and most comprehensive coverage of the topic: Definitive …
[PDF][PDF] Twofish: A 128-bit block cipher
Twofish is a 128-bit block cipher that accepts a variable-length key up to 256 bits. The cipher
is a 16-round Feistel network with a bijective F function made up of four key-dependent 8-by …
is a 16-round Feistel network with a bijective F function made up of four key-dependent 8-by …
Four decades of research on bent functions
In this survey, we revisit the Rothaus paper and the chapter of Dillon's thesis dedicated to
bent functions, and we describe the main results obtained on these functions during these …
bent functions, and we describe the main results obtained on these functions during these …