Suchergebnisse - ACM: E.: Data/E.3: DATA ENCRYPTION/E.3.0: Code treating
-
1
Autoren:
Quelle: ACM Computing Surveys; Apr2014, Vol. 46 Issue 4, p53:1-53:26, 26p, 5 Diagrams, 1 Chart
Schlagwörter: DATA encryption, COMPUTER operating systems, COMPUTER hacking, COPROCESSORS, DATA protection
-
2
Autoren:
Quelle: Communications of the ACM; May2023, Vol. 66 Issue 5, p72-81, 10p, 1 Color Photograph, 4 Diagrams, 1 Chart
Schlagwörter: DATA encryption, ENCRYPTION protocols, DATA security, COMPILERS (Computer programs)
-
3
Autoren: et al.
Weitere Verfasser: et al.
Quelle: EUROCRYPT 2012 ; https://inria.hal.science/hal-00864374 ; EUROCRYPT 2012, IACR, Apr 2012, Cambridge, United Kingdom. pp.502-519, ⟨10.1007/978-3-642-29011-4_30⟩ ; http://link.springer.com/chapter/10.1007%2F978-3-642-29011-4_30
Schlagwörter: Fully-homomorphic encryption, cryptanalysis, approximate gcd, ACM: E.: Data/E.3: DATA ENCRYPTION/E.3.0: Code breaking, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Geographisches Schlagwort: Cambridge, United Kingdom
-
4
Autoren: et al.
Quelle: IET Computers & Digital Techniques (Institution of Engineering & Technology); Jul2009, Vol. 3 Issue 4, p354-372, 19p, 5 Diagrams, 7 Charts, 3 Graphs
Schlagwörter: DATA encryption, ELECTRONIC systems, CACHE memory, COMPUTER software, COMPUTER systems
-
5
Autoren: et al.
Quelle: ACM Transactions on Storage; Jun2020, Vol. 16 Issue 2, p1-31, 31p
Schlagwörter: MESSAGE authentication codes, DATA encryption, METADATA, DATA protection, MEMORY, CACHE memory
-
6
Autoren: et al.
Weitere Verfasser: et al.
Quelle: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607289 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.47-56
Schlagwörter: Identifying code, optimal code, hexagonal grid, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607289; https://hal.inria.fr/inria-00607289; https://hal.inria.fr/inria-00607289/document; https://hal.inria.fr/inria-00607289/file/45.pdf
-
7
Autoren: et al.
Weitere Verfasser: et al.
Quelle: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00608102 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.183-192
Schlagwörter: gaps of a code, Berger-Loidreau cryptosystem, square code, GRS codes, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00608102; https://hal.inria.fr/inria-00608102; https://hal.inria.fr/inria-00608102/document; https://hal.inria.fr/inria-00608102/file/117.pdf
-
8
Autoren: GHERAIBIA, MOHAMED YACINE
Quelle: i-Manager's Journal on Image Processing; Apr-Jun2019, Vol. 6 Issue 2, p1-13, 13p
-
9
Autoren:
Weitere Verfasser:
Quelle: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607291 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.57-62
Schlagwörter: Linear codes, Projective spaces, Small weight codewords, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: inria-00607291; https://hal.inria.fr/inria-00607291; https://hal.inria.fr/inria-00607291/document; https://hal.inria.fr/inria-00607291/file/53.pdf
-
10
Autoren: et al.
Weitere Verfasser: et al.
Quelle: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607730 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.91-100
Schlagwörter: Ring-Linear Codes, MacWilliams' Equivalence Theorem, Extension Theorem, Weights, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607730; https://hal.inria.fr/inria-00607730; https://hal.inria.fr/inria-00607730/document; https://hal.inria.fr/inria-00607730/file/137.pdf
-
11
Autoren:
Quelle: ACM Transactions on Programming Languages & Systems; Aug2010, Vol. 32 Issue 6, p23-23:84, 84p, 13 Black and White Photographs, 11 Diagrams, 8 Charts, 1 Graph
-
12
Autoren: et al.
Quelle: DAC: Annual ACM/IEEE Design Automation Conference; Jun2016, p440-445, 6p
Schlagwörter: DATA encryption, CODE reuse, COMPUTER security, COMPUTER architecture, COMPUTER programming
-
13
Autoren: et al.
Weitere Verfasser: et al.
Quelle: WCC 2011 - Workshop on coding and cryptography ; https://inria.hal.science/inria-00608107 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.193-202
Schlagwörter: permutation group, subcode, idempotent subcode, de- coding, Goppa code, quasi-cyclic code, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
-
14
Autoren: et al.
Weitere Verfasser: et al.
Quelle: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00614257 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.273-282
Schlagwörter: Affine-variety codes, linear code, distance, minimum-weight word, Hermitian code, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00614257; https://hal.inria.fr/inria-00614257; https://hal.inria.fr/inria-00614257/document; https://hal.inria.fr/inria-00614257/file/44.pdf
-
15
Autoren: BARAK, BOAZ
Quelle: Communications of the ACM; Mar2016, Vol. 59 Issue 3, p88-96, 9p, 1 Color Photograph, 4 Diagrams, 1 Graph
-
16
Autoren: et al.
Quelle: ACM Transactions on Storage; May2016, Vol. 12 Issue 4, p18:1-18:37, 37p
-
17
Autoren: et al.
Weitere Verfasser: et al.
Quelle: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607733 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.101-110
Schlagwörter: module of solutions, negacyclic code, integers modulo 4, Lee metric, Galois Ring, decoding, Grobner bases, key equation, solution by approximations, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607733; https://hal.inria.fr/inria-00607733; https://hal.inria.fr/inria-00607733/document; https://hal.inria.fr/inria-00607733/file/66.pdf
-
18
Autoren: et al.
Weitere Verfasser: et al.
Quelle: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00614246 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.263-272
Schlagwörter: Affine variety code, list decoding, multiplicity, Schwartz- Zippel bound, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00614246; https://hal.inria.fr/inria-00614246; https://hal.inria.fr/inria-00614246/document; https://hal.inria.fr/inria-00614246/file/82.pdf
-
19
Autoren: et al.
Weitere Verfasser: et al.
Quelle: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00614390 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.331-340
Schlagwörter: Code, symmetric error, limited magnitude error, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00614390; https://hal.inria.fr/inria-00614390; https://hal.inria.fr/inria-00614390/document; https://hal.inria.fr/inria-00614390/file/38.pdf
-
20
Autoren:
Quelle: International Review on Computers & Software; Aug2013, Vol. 8 Issue 8, p1980-1990, 11p
Full Text Finder
Nájsť tento článok vo Web of Science