Works matching DE "CRYPTOGRAPHERS"


Results: 76
    1
    2

    Ancient Encryption.

    Published in:
    ISSA Journal, 2016, v. 14, n. 7, p. 47
    By:
    • Martin, Luther
    Publication type:
    Article
    3

    The Navajo Code Talkers.

    Published in:
    International Journal of Humanities & Peace, 1995, v. 11, n. 2, p. 76
    By:
    • Hafford, William E.
    Publication type:
    Article
    4
    5
    6

    FlipIt: The Game of 'Stealthy Takeover'.

    Published in:
    Journal of Cryptology, 2013, v. 26, n. 4, p. 655, doi. 10.1007/s00145-012-9134-5
    By:
    • Dijk, Marten;
    • Juels, Ari;
    • Oprea, Alina;
    • Rivest, Ronald
    Publication type:
    Article
    7

    Structural Cryptanalysis of SASAS.

    Published in:
    Journal of Cryptology, 2010, v. 23, n. 4, p. 505, doi. 10.1007/s00145-010-9062-1
    By:
    • Biryukov, Alex;
    • Shamir, Adi
    Publication type:
    Article
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19

    Cryptographer.

    Published in:
    Science Teacher, 2005, v. 72, n. 8, p. 56
    By:
    • Sullivan, Megan
    Publication type:
    Article
    20
    21
    23
    24
    25
    26
    27
    28
    29
    30
    31

    Oblivious signature-based envelope.

    Published in:
    Distributed Computing, 2005, v. 17, n. 4, p. 293, doi. 10.1007/s00446-004-0116-1
    By:
    • Li, Ninghui;
    • Du, Wenliang;
    • Boneh, Dan
    Publication type:
    Article
    32
    33
    34

    Modal independence logic.

    Published in:
    Journal of Logic & Computation, 2017, v. 27, n. 5, p. 1333, doi. 10.1093/logcom/exw019
    By:
    • KONTINEN, JUHA;
    • MÜLLER, JULIAN-STEFFEN;
    • SCHNOOR, HENNING;
    • VOLLMER, HERIBERT
    Publication type:
    Article
    35
    36
    37
    38
    39
    41
    42
    43

    The Russian Fish with Caviar.

    Published in:
    Cryptologia, 2014, v. 38, n. 1, p. 61, doi. 10.1080/01611194.2013.797046
    By:
    • Rezabek, Randy
    Publication type:
    Article
    44

    Lester Hill Revisited.

    Published in:
    Cryptologia, 2014, v. 38, n. 4, p. 293, doi. 10.1080/01611194.2014.915260
    By:
    • Christensen, Chris
    Publication type:
    Article
    45
    47
    48
    49
    50