Search Results - "Code based cryptosystem"

Refine Results
  1. 1
  2. 2
  3. 3

    Authors: A.Ya. Davletova

    Source: Informatics and mathematical methods in simulation. 14:12-23

  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Contributors: S. Perriello A. Barenghi G. Pelosi et al.

    Relation: info:eu-repo/semantics/altIdentifier/isbn/978-303090021-2; info:eu-repo/semantics/altIdentifier/isbn/978-3-030-90022-9; info:eu-repo/semantics/altIdentifier/wos/WOS:000769464900025; ispartofbook:EAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks; EAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks; firstpage:458; lastpage:474; numberofpages:17; serie:LECTURE NOTES OF THE INSTITUTE FOR COMPUTER SCIENCES, SOCIAL INFORMATICS AND TELECOMMUNICATIONS ENGINEERING; alleditors:J. Garcia-Alfaro, S. Li, R. Poovendran, H. Debar, M. Yung; http://hdl.handle.net/11311/1191841

  17. 17
  18. 18
  19. 19

    Source: Applicable Algebra in Engineering, Communication & Computing; Sep2024, Vol. 35 Issue 5, p647-665, 19p

  20. 20