Works matching DE "CRYPTOGRAPHERS"
1
- Dynamics (2673-8716), 2024, v. 4, n. 1, p. 170, doi. 10.3390/dynamics4010010
- Karananou, Peristera;
- Andronikos, Theodore
- Article
2
- Software (2674-113X), 2024, v. 3, n. 3, p. 284, doi. 10.3390/software3030015
- Siewe, François;
- Germanos, Vasileios;
- Zeng, Wen
- Article
3
- ISSA Journal, 2017, v. 15, n. 1, p. 10
- Article
4
- Journal of Cryptology, 2013, v. 26, n. 4, p. 559, doi. 10.1007/s00145-012-9128-3
- Article
5
- Journal of Cryptology, 2013, v. 26, n. 4, p. 655, doi. 10.1007/s00145-012-9134-5
- Dijk, Marten;
- Juels, Ari;
- Oprea, Alina;
- Rivest, Ronald
- Article
6
- Journal of Cryptology, 2010, v. 23, n. 4, p. 505, doi. 10.1007/s00145-010-9062-1
- Biryukov, Alex;
- Shamir, Adi
- Article
7
- Journal of Cryptology, 2003, v. 16, n. 4, p. 219, doi. 10.1007/s00145-002-0146-4
- Brassard, Gilles;
- Crépeau, Claude;
- Wolf, Stefan
- Article
8
- Defence Science Journal, 2012, v. 62, n. 1, p. 25, doi. 10.14429/dsj.62.1438
- Garga, Ganesh;
- Das, Saptarsi;
- Nandy, S. K.;
- Narayan, Ranjani;
- Haldar, Chandan;
- Jagtap, Maheshkumar P.;
- Dash, Siba Prasad
- Article
9
- Whispering Wind, 2012, v. 41, n. 1, p. 21
- Article
10
- Whispering Wind, 2008, v. 38, n. 1, p. 38
- Article
11
- Quantum Information Processing, 2010, v. 9, n. 1, p. 37, doi. 10.1007/s11128-009-0127-8
- do Nascimento, José Cláudio;
- Ramos, Rubens Viana
- Article
12
- Journal of Film & Video, 2002, v. 54, n. 1, p. 10
- Article
13
- Journal of Logic & Computation, 2017, v. 27, n. 5, p. 1333, doi. 10.1093/logcom/exw019
- KONTINEN, JUHA;
- MÜLLER, JULIAN-STEFFEN;
- SCHNOOR, HENNING;
- VOLLMER, HERIBERT
- Article
14
- Distributed Computing, 2005, v. 17, n. 4, p. 293, doi. 10.1007/s00446-004-0116-1
- Li, Ninghui;
- Du, Wenliang;
- Boneh, Dan
- Article
15
- Genetics, 2017, v. 206, n. 1, p. 1, doi. 10.1534/genetics.117.201624
- Article
17
- Information Security Journal: A Global Perspective, 2017, v. 26, n. 6, p. 287, doi. 10.1080/19393555.2017.1385116
- Kamil, Ismaila;
- Olakanmi, Oladayo;
- Ogundoyin, Sunday Oyinlola
- Article
18
- International Journal of Theoretical Physics, 2015, v. 54, n. 1, p. 106, doi. 10.1007/s10773-014-2206-6
- Wang, Qing-le;
- Zhang, Ke-jia
- Article
19
- International Journal of Theoretical Physics, 2013, v. 52, n. 2, p. 376, doi. 10.1007/s10773-012-1342-0
- Shi, Ronghua;
- Su, Qian;
- Guo, Ying;
- Huang, Dazu
- Article
20
- Nature, 2015, v. 525, n. 7568, p. 167, doi. 10.1038/525167a
- Article
21
- Annales UMCS, Informatica, 2014, v. 14, n. 1, p. 49, doi. 10.2478/umcsinfo-2014-0007
- Article
22
- ISSA Journal, 2016, v. 14, n. 7, p. 47
- Article
23
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/5160237
- Chu, Zhihui;
- Chen, Huaifeng;
- Wang, Xiaoyun;
- Dong, Xiaoyang;
- Li, Lu
- Article
24
- International Journal of Universal Computer Science, 2010, v. 1, n. 2, p. 59
- Elboukhari, Mohamed;
- Azizi, Mostafa;
- Azizi, Abdelmalek
- Article
25
- Journal of Intelligence History, 2020, v. 19, n. 2, p. 125, doi. 10.1080/16161262.2020.1778325
- Article
27
- Intelligence & National Security, 2011, v. 26, n. 5, p. 639, doi. 10.1080/02684527.2011.604201
- Article
29
- 2016
- CHATZIKOKOLAKIS, KONSTANTINOS;
- PALAMIDESSI, CATUSCIA;
- BRAUN, CHRISTELLE
- Case Study
30
- Math Horizons, 2021, v. 28, n. 3, p. 8, doi. 10.1080/10724117.2020.1849525
- Article
31
- Sensors (14248220), 2016, v. 16, n. 5, p. 609, doi. 10.3390/s16050609
- Hua Guo;
- Yandong Zheng;
- Xiyong Zhang;
- Zhoujun Li
- Article
32
- Science Teacher, 2005, v. 72, n. 8, p. 56
- Article
33
- Wireless Personal Communications, 2018, v. 101, n. 3, p. 1715, doi. 10.1007/s11277-018-5787-1
- Ahmad, Musheer;
- Doja, M. N.;
- Beg, M. M. Sufyan
- Article
34
- Wireless Personal Communications, 2018, v. 101, n. 1, p. 439, doi. 10.1007/s11277-018-5698-1
- Hayat, Umar;
- Asif, Muhammad;
- Azam, Naveed Ahmed
- Article
35
- History Today, 1991, v. 41, n. 7, p. 13
- Article
37
- International Journal of Information Security Science, 2012, v. 1, n. 2, p. 49
- Ashraf, Muhammad;
- Kırlar, Barış Bülent
- Article
40
- Cryptologia, 2016, v. 40, n. 4, p. 355, doi. 10.1080/01611194.2015.1084960
- Article
41
- Cryptologia, 2015, v. 39, n. 4, p. 342, doi. 10.1080/01611194.2014.988369
- Article
42
- Cryptologia, 2014, v. 38, n. 4, p. 293, doi. 10.1080/01611194.2014.915260
- Article
43
- Cryptologia, 2014, v. 38, n. 1, p. 61, doi. 10.1080/01611194.2013.797046
- Article
44
- Cryptologia, 2014, v. 38, n. 2, p. 103, doi. 10.1080/01611194.2014.885789
- Article
45
- Cryptologia, 2013, v. 37, n. 3, p. 233, doi. 10.1080/01611194.2013.797048
- Soler Fuensanta, José Ramón;
- López-Brea Espiau, Francisco Javier;
- Navarro Bonilla, Diego
- Article
48
- Cryptologia, 2012, v. 36, n. 3, p. 263, doi. 10.1080/01611194.2012.687428
- Soler Fuensanta, J. Ramón;
- López-Brea Espiau, Francisco Javier;
- Navarro Bonilla, Diego
- Article
49
- Cryptologia, 2011, v. 35, n. 3, p. 277, doi. 10.1080/01611194.2011.595623
- Article
50
- Cryptologia, 2011, v. 35, n. 2, p. 110, doi. 10.1080/01611194.2011.558980
- Article