Works matching IS 0010485X AND DT 2009 AND VI 85 AND IP 1/2
Results: 11
Discrete logarithms for finite groups.
- Published in:
- Computing, 2009, v. 85, n. 1/2, p. 3, doi. 10.1007/s00607-009-0032-0
- By:
- Publication type:
- Article
Random key predistribution for wireless sensor networks using deployment knowledge.
- Published in:
- Computing, 2009, v. 85, n. 1/2, p. 57, doi. 10.1007/s00607-009-0036-9
- By:
- Publication type:
- Article
Step-out group signatures.
- Published in:
- Computing, 2009, v. 85, n. 1/2, p. 137, doi. 10.1007/s00607-009-0040-0
- By:
- Publication type:
- Article
A variant of Wiener’s attack on RSA.
- Published in:
- Computing, 2009, v. 85, n. 1/2, p. 77, doi. 10.1007/s00607-009-0037-8
- By:
- Publication type:
- Article
Editorial.
- Published in:
- 2009
- By:
- Publication type:
- Editorial
An approach for stream ciphers design based on joint computing over random and secret data.
- Published in:
- Computing, 2009, v. 85, n. 1/2, p. 153, doi. 10.1007/s00607-009-0035-x
- By:
- Publication type:
- Article
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers.
- Published in:
- Computing, 2009, v. 85, n. 1/2, p. 85, doi. 10.1007/s00607-009-0034-y
- By:
- Publication type:
- Article
On affine (non)equivalence of Boolean functions.
- Published in:
- Computing, 2009, v. 85, n. 1/2, p. 37, doi. 10.1007/s00607-009-0041-z
- By:
- Publication type:
- Article
A new matrix test for randomness.
- Published in:
- Computing, 2009, v. 85, n. 1/2, p. 21, doi. 10.1007/s00607-009-0033-z
- By:
- Publication type:
- Article
On an infinite family of graphs with information ratio 2 − 1/ k.
- Published in:
- Computing, 2009, v. 85, n. 1/2, p. 127, doi. 10.1007/s00607-009-0039-6
- By:
- Publication type:
- Article
Post-quantum cryptography: lattice signatures.
- Published in:
- Computing, 2009, v. 85, n. 1/2, p. 105, doi. 10.1007/s00607-009-0042-y
- By:
- Publication type:
- Article