Search Result Save to File Save as CSV
Your search for 42159 returns 2407 document(s)
Separating and intersecting properties of BCH and Kasami Codes, (LNCS-Lecture Notes in Computer Science 2898), Hal. 52-65
Author: Hans Georg Schasthun and Tor Hellesett; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Improved fast correlation attack using low rate codes, (LNCS-Lecture Notes in Computer Science 2898), Hal. 67-81
Author: Havard Molland; Jaohn Erik Mathinasen, Tor Helleseth; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Degree optimized resilleint boolean functions from maiorna-McFarland Class, (LNCS-Lecture Notes in Computer Science 2898), Hal. 93-114
Author: Enes Pasalic; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 167-182
Author: Dae Hyun Yum and Pil Joong Lee; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Estimates for discrete logarihms computations in finite fields of small characteristics, LNCS-Lecture Notes in Computer Science 2898), Hal. 190-206
Author: Robert Granger; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of double block lengt hash function, LNCS-Lecture Notes in Computer Science 2898), Hal. 289-305
Author: Mitauhiro Hattori, Shoichi Hirose, and Susumu Yoshida; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography in wireless standards (inviteri paper), LNCS-Lecture Notes in Computer Science 2898), Hal. 303-305
Author: Valterri Niemi; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the correctness of scurity proofs for the 3GPP confidentiality and integrity algorithms, LNCS-Lecture Notes in Computer Science 2898), Hal. 206-318
Author: Testsu Iwata and Kaoru Kurosawa; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A General attack model on hash-based client puzzles, (LNCS-Lecture Notes in Computer Science 2898),Hal. 319-331
Author: Geraint Price; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Tripartite authenticated key agreement protocols from pairings, (LNCS-Lecture Notes in Computer Science 2898), Hal. 332-344
Author: S.S. Al. Riyami and K.G. Pterson; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next