Search Results - "Code-based cryptosystem"
-
1
Authors:
Source: IEEE Transactions on Information Theory. 71:6857-6869
-
2
-
3
Authors: A.Ya. Davletova
Source: Informatics and mathematical methods in simulation. 14:12-23
-
4
Authors:
Source: Applicable Algebra in Engineering, Communication and Computing. 35:647-665
-
5
Authors:
Source: 2022 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF). :1-5
-
6
Authors:
Source: 2021 XVII International Symposium "Problems of Redundancy in Information and Control Systems" (REDUNDANCY). :66-69
-
7
Authors:
Source: Lecture Notes in Computer Science ISBN: 9783031223006
-
8
-
9
Authors: et al.
Source: Security and Communication Networks. 2019:1-10
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences
File Description: text/xhtml
-
10
Authors: et al.
Source: Lecture Notes in Computer Science ISBN: 9783030540739
-
11
Authors:
Source: Indonesian Journal of Electrical Engineering and Computer Science. 32:804
-
12
Authors:
Source: IEEE Communications Letters. 20:870-873
Subject Terms: 13. Climate action, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 7. Clean energy
-
13
Authors:
Subject Terms: FOS: Computer and information sciences, Computer Science - Cryptography and Security, 0202 electrical engineering, electronic engineering, information engineering, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2006.00514
-
14
-
15
-
16
Authors: et al.
Contributors: et al.
Subject Terms: Post-Quantum Cryptography, Code based cryptography, Information Set Decoding, Computer Security, Cryptography
Relation: info:eu-repo/semantics/altIdentifier/isbn/978-303090021-2; info:eu-repo/semantics/altIdentifier/isbn/978-3-030-90022-9; info:eu-repo/semantics/altIdentifier/wos/WOS:000769464900025; ispartofbook:EAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks; EAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks; firstpage:458; lastpage:474; numberofpages:17; serie:LECTURE NOTES OF THE INSTITUTE FOR COMPUTER SCIENCES, SOCIAL INFORMATICS AND TELECOMMUNICATIONS ENGINEERING; alleditors:J. Garcia-Alfaro, S. Li, R. Poovendran, H. Debar, M. Yung; http://hdl.handle.net/11311/1191841
-
17
Source: Mathematical and computer modelling. Series: Technical sciences; 2017: Mathematical and computer modelling. Series: Technical sciences. Issue 15; 109-115; 109-115; 2308-5916; 10.32626/2308-5916.2017-15
-
18
Authors:
Source: Mathematics in Industry ISBN: 9783642309038
-
19
Authors:
Source: Applicable Algebra in Engineering, Communication & Computing; Sep2024, Vol. 35 Issue 5, p647-665, 19p
Subject Terms: LOW-rank matrices, RANDOM matrices, CRYPTOGRAPHY
-
20
Authors:
Source: Indonesian Journal of Electrical Engineering & Computer Science; Nov2023, Vol. 32 Issue 2, p804-810, 7p
Full Text Finder
Nájsť tento článok vo Web of Science