Works matching DE "ALGEBRAIC attacks (Cryptography)"
1
- Advances in Mathematics of Communications, 2016, v. 10, n. 2, p. 291, doi. 10.3934/amc.2016006
- GAGOLA III, STEPHEN M.;
- HALL, JOANNE L.
- Article
2
- International Journal of Advanced Research in Computer Science, 2016, v. 7, n. 3, p. 44
- Ahmad, Musheer;
- Al Sharari, Hamed D.
- Article
3
- European Journal of Pure & Applied Mathematics, 2014, v. 7, n. 3, p. 256
- Edemskiy, Vladimir;
- Antonova, Olga
- Article
4
- International Journal of Foundations of Computer Science, 2014, v. 25, n. 6, p. 763, doi. 10.1142/S0129054114500324
- TANG, DENG;
- CARLET, CLAUDE;
- TANG, XIAOHU
- Article
5
- Defence Science Journal, 2016, v. 66, n. 6, p. 582, doi. 10.14429/dsj.66.10798
- Sahu, Harish Kumar;
- Jadhav, Vikas;
- Sonavane, Shefali;
- Sharma, R. K.
- Article
6
- Technical Journal of University of Engineering & Technology Taxila, 2018, v. 23, n. 2, p. 56
- Majid, A. H.;
- Anwar, M.;
- Ashraf, M. W.
- Article
7
- Journal of Politics in Latin America, 2014, v. 6, n. 2, p. 1
- Lafitte, Frédéric;
- Nakahara Jr, Jorge;
- Van Heule, Dirk
- Article
8
- Journal of Symbolic Logic, 2013, v. 78, n. 4, p. 1218, doi. 10.2178/jsl.7804120
- BIENVENU, LAURENT;
- DAY, ADAM R.;
- HÖLZL, RUPERT
- Article
9
- Journal of ICT Research & Applications, 2015, v. 9, n. 1, p. 88, doi. 10.5614/itbj.ict.res.appl.2015.9.1.5
- Afianti, Farah;
- Barmawi, Ari M.
- Article
10
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/842675
- Junghwan Song;
- Kwanhyung Lee;
- Younghoon Jung
- Article
11
- Computing & Informatics, 2018, v. 37, n. 2, p. 349, doi. 10.4149/cai_2018_2_349
- Article
12
- Cryptologia, 2014, v. 38, n. 4, p. 348, doi. 10.1080/01611194.2014.915706
- Article
13
- 2016
- Yang, Guomin;
- Susilo, Willy;
- Mu, Yi
- Editorial
14
- International Journal of Information Security, 2016, v. 15, n. 1, p. 35, doi. 10.1007/s10207-015-0287-8
- Liu, Weiran;
- Liu, Jianwei;
- Wu, Qianhong;
- Qin, Bo;
- Li, Yan
- Article
15
- International Journal of Information Security, 2016, v. 15, n. 1, p. 81, doi. 10.1007/s10207-015-0289-6
- Article
16
- International Journal of Information Security, 2016, v. 15, n. 1, p. 51, doi. 10.1007/s10207-015-0295-8
- Sušil, Petr;
- Sepehrdad, Pouyan;
- Vaudenay, Serge;
- Courtois, Nicolas
- Article
17
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4285, doi. 10.1002/sec.1606
- Zhang, Wenying;
- Zhang, Wenyu
- Article
18
- Security & Communication Networks, 2014, v. 7, n. 3, p. 503, doi. 10.1002/sec.744
- Huang, Heliang;
- Bao, Wansu;
- Liu, Shukai
- Article
19
- Algebra & Logic, 2015, v. 54, n. 1, p. 81, doi. 10.1007/s10469-015-9327-8
- Article
20
- Rad HAZU: Matematicke Znanosti, 2021, v. 25, p. 51, doi. 10.21857/y26kec4k89
- Courtois, Nicolas T.;
- Grajek, Marek;
- Rams, Michał
- Article
21
- Rad HAZU: Matematicke Znanosti, 2021, v. 25, p. 33, doi. 10.21857/yvjrdcl0ey
- Bednáriková, Alena;
- Zajac, Pavol
- Article
22
- Computer Journal, 2017, v. 60, n. 12, p. 1785, doi. 10.1093/comjnl/bxx055
- YING WU;
- JINYONG CHANG;
- RUI XUE;
- RUI ZHANG
- Article
23
- Computer Journal, 2016, v. 59, n. 4, p. 439, doi. 10.1093/comjnl/bxv056
- WUQIANG SHEN;
- SHAOHUA TANG
- Article
24
- Journal of Mathematical Cryptology, 2018, v. 12, n. 3, p. 143, doi. 10.1515/jmc-2017-0005
- Raddum, Håvard;
- Zajac, Pavol
- Article
25
- Journal of Mathematical Cryptology, 2012, v. 6, n. 3/4, p. 229, doi. 10.1515/jmc-2011-0010
- Mouha, Nicky;
- Sekar, Gautham;
- Preneel, Bart
- Article