Search Results - "random linear code encryption"
-
1
Authors:
Source: 网络与信息安全学报, Vol 6, Iss 5, Pp 110-118 (2020)
Subject Terms: polar code, random linear code encryption, message padding, adaptively chosen ciphertext attacks, structural attacks, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
2
Authors:
Source: 网络与信息安全学报, Vol 6, Pp 110-118 (2020)
Subject Terms: Polar code, random linear code encryption, message padding, adaptively chosen ciphertext attacks, structural attacks, Electronic computers. Computer science, QA75.5-76.95
-
3
Authors: et al.
Source: International Journal of Innovative Research & Scientific Studies; 2025, Vol. 8 Issue 5, p245-255, 11p
-
4
-
5
Authors:
Source: Quantum Information Processing; Jun2022, Vol. 21 Issue 6, p1-22, 22p
-
6
Authors:
Source: Communications in Computer and Information Science ISBN: 9789811579806
-
7
Authors:
Contributors:
-
8
Authors:
Resource Type: eBook.
Categories: BUSINESS & ECONOMICS / Operations Research, COMPUTERS / Machine Theory, COMPUTERS / Security / Cryptography & Encryption, MATHEMATICS / General, MATHEMATICS / Applied, MATHEMATICS / Graphic Methods, MATHEMATICS / Number Systems, MATHEMATICS / Probability & Statistics / Bayesian Analysis
-
9
Authors: et al.
Resource Type: eBook.
Subjects: Data mining, Artificial intelligence, Application software, Computer networks, Computer systems, Data structures (Computer science), Information theory
Categories: COMPUTERS / Data Science / Data Analytics, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Business & Productivity Software / General, COMPUTERS / Computer Architecture, COMPUTERS / Database Administration & Management, COMPUTERS / Information Theory, COMPUTERS / Networking / General, COMPUTERS / Hardware / General, MATHEMATICS / Probability & Statistics / General
-
10
Authors:
Resource Type: eBook.
Subjects: Cryptography, Data encryption (Computer science), Data protection, Computers, Computer engineering, Computer networks
Categories: COMPUTERS / Security / Cryptography & Encryption, COMPUTERS / General, COMPUTERS / Security / General, COMPUTERS / Hardware / General
-
11
-
12
-
13
-
14
Nájsť tento článok vo Web of Science
Full Text Finder