权威例句
Cryptographical properties of Ising spin systemsEavesdropping on quantum-cryptographical systemsGauss periods: orders and cryptographical applicationsGauss periods: orders and cryptographical applicationsSome Consequences of Cryptographical Conjectures for S_2^1 and EFSome consequences of cryptographical conjectures for S 1 2 and EFSome Consequences of Cryptographical Conjectures for S 1 2 and EF ☆Discrete-time chaotic encryption systems. III. Cryptographical analysisPrivacy-preserving RFID authentication based on cryptographical encodingPrivacy-preserving RFID authentication based on cryptographical encoding