Your search for 38523 returns 2380 document(s) |
On plateaued functions and their constructions, (LNCS-Lecture Notes in Computer Science 2887) Hal 54-73 |
Author: Claude Carlet; Emmanuel Prouff; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Intrusion-resilient signatures: generic constructions, or defeating strong adversary with minimal assumptions, (LNCS-Lecture Notes in Computer Science 2576) Hal 102-118 |
Author: Gene Itkis; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Automated search for heuristic functions, ((LNCS-Lecture Notes in Computer Science 3709) Hal 843 |
Author: Pavel Cejnar; Roman Bartak; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Degree optimized resilleint boolean functions from maiorna-McFarland Class, (LNCS-Lecture Notes in Computer Science 2898), Hal. 93-114 |
Author: Enes Pasalic; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fast recursive computation of local axial moments by using primitive kernel functions, (LNCS-Lecture Notes in Computer Science 1557) Hal 596-597 |
Author: Roman M. Palenichka; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the covering radius of second order binary reed-muller code in set of resilliet boolean functions, (LNCS-Lecture Notes in Computer Science 2898), Hal. 82-92 |
Author: Yuri Borissov; An Braeken; Svetla Nikova; and Preneel; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of idea-x/2, (LNCS-Lecture Notes in Computer Science 2887) Hal 1-8 |
Author: Havard Raddum; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Linear redundancy in s-boxes, (LNCS-Lecture Notes in Computer Science 2887) Hal 74-86 |
Author: Joanne Fuller; William Millan; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Loosening the knot, (LNCS-Lecture Notes in Computer Science 2887) Hal 87-99 |
Author: Antoine Joux; Frederic the Knot; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the resynchronization attack, (LNCS-Lecture Notes in Computer Science 2887) Hal 100-110 |
Author: Jovan Dj. Golic; Guglielmo Morgari; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|