Search Results - ACM: E.: Data/E.3: DATA ENCRYPTION/E.3.0: Code treating~
-
1
Authors:
Source: ACM Computing Surveys; Apr2014, Vol. 46 Issue 4, p53:1-53:26, 26p, 5 Diagrams, 1 Chart
Subject Terms: DATA encryption, COMPUTER operating systems, COMPUTER hacking, COPROCESSORS, DATA protection
-
2
Authors:
Source: Communications of the ACM; May2023, Vol. 66 Issue 5, p72-81, 10p, 1 Color Photograph, 4 Diagrams, 1 Chart
Subject Terms: DATA encryption, ENCRYPTION protocols, DATA security, COMPILERS (Computer programs)
-
3
Authors: et al.
Contributors: et al.
Source: EUROCRYPT 2012 ; https://inria.hal.science/hal-00864374 ; EUROCRYPT 2012, IACR, Apr 2012, Cambridge, United Kingdom. pp.502-519, ⟨10.1007/978-3-642-29011-4_30⟩ ; http://link.springer.com/chapter/10.1007%2F978-3-642-29011-4_30
Subject Terms: Fully-homomorphic encryption, cryptanalysis, approximate gcd, ACM: E.: Data/E.3: DATA ENCRYPTION/E.3.0: Code breaking, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Subject Geographic: Cambridge, United Kingdom
-
4
Authors: et al.
Source: IET Computers & Digital Techniques (Institution of Engineering & Technology); Jul2009, Vol. 3 Issue 4, p354-372, 19p, 5 Diagrams, 7 Charts, 3 Graphs
Subject Terms: DATA encryption, ELECTRONIC systems, CACHE memory, COMPUTER software, COMPUTER systems
-
5
Authors: et al.
Source: ACM Transactions on Storage; Jun2020, Vol. 16 Issue 2, p1-31, 31p
Subject Terms: MESSAGE authentication codes, DATA encryption, METADATA, DATA protection, MEMORY, CACHE memory
-
6
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607289 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.47-56
Subject Terms: Identifying code, optimal code, hexagonal grid, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607289; https://hal.inria.fr/inria-00607289; https://hal.inria.fr/inria-00607289/document; https://hal.inria.fr/inria-00607289/file/45.pdf
-
7
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00608102 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.183-192
Subject Terms: gaps of a code, Berger-Loidreau cryptosystem, square code, GRS codes, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00608102; https://hal.inria.fr/inria-00608102; https://hal.inria.fr/inria-00608102/document; https://hal.inria.fr/inria-00608102/file/117.pdf
-
8
Authors: GHERAIBIA, MOHAMED YACINE
Source: i-Manager's Journal on Image Processing; Apr-Jun2019, Vol. 6 Issue 2, p1-13, 13p
-
9
Authors:
Contributors:
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607291 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.57-62
Subject Terms: Linear codes, Projective spaces, Small weight codewords, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: inria-00607291; https://hal.inria.fr/inria-00607291; https://hal.inria.fr/inria-00607291/document; https://hal.inria.fr/inria-00607291/file/53.pdf
-
10
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607730 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.91-100
Subject Terms: Ring-Linear Codes, MacWilliams' Equivalence Theorem, Extension Theorem, Weights, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607730; https://hal.inria.fr/inria-00607730; https://hal.inria.fr/inria-00607730/document; https://hal.inria.fr/inria-00607730/file/137.pdf
-
11
Authors:
Source: ACM Transactions on Programming Languages & Systems; Aug2010, Vol. 32 Issue 6, p23-23:84, 84p, 13 Black and White Photographs, 11 Diagrams, 8 Charts, 1 Graph
-
12
Authors: et al.
Source: DAC: Annual ACM/IEEE Design Automation Conference; Jun2016, p440-445, 6p
Subject Terms: DATA encryption, CODE reuse, COMPUTER security, COMPUTER architecture, COMPUTER programming
-
13
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://inria.hal.science/inria-00608107 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.193-202
Subject Terms: permutation group, subcode, idempotent subcode, de- coding, Goppa code, quasi-cyclic code, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
-
14
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00614257 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.273-282
Subject Terms: Affine-variety codes, linear code, distance, minimum-weight word, Hermitian code, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00614257; https://hal.inria.fr/inria-00614257; https://hal.inria.fr/inria-00614257/document; https://hal.inria.fr/inria-00614257/file/44.pdf
-
15
Authors: BARAK, BOAZ
Source: Communications of the ACM; Mar2016, Vol. 59 Issue 3, p88-96, 9p, 1 Color Photograph, 4 Diagrams, 1 Graph
-
16
Authors: et al.
Source: ACM Transactions on Storage; May2016, Vol. 12 Issue 4, p18:1-18:37, 37p
Subject Terms: INFORMATION retrieval, COMPUTATIONAL complexity, COMPUTER software, DATA security, DATA encryption
-
17
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607733 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.101-110
Subject Terms: module of solutions, negacyclic code, integers modulo 4, Lee metric, Galois Ring, decoding, Grobner bases, key equation, solution by approximations, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607733; https://hal.inria.fr/inria-00607733; https://hal.inria.fr/inria-00607733/document; https://hal.inria.fr/inria-00607733/file/66.pdf
-
18
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00614246 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.263-272
Subject Terms: Affine variety code, list decoding, multiplicity, Schwartz- Zippel bound, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00614246; https://hal.inria.fr/inria-00614246; https://hal.inria.fr/inria-00614246/document; https://hal.inria.fr/inria-00614246/file/82.pdf
-
19
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00614390 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.331-340
Subject Terms: Code, symmetric error, limited magnitude error, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00614390; https://hal.inria.fr/inria-00614390; https://hal.inria.fr/inria-00614390/document; https://hal.inria.fr/inria-00614390/file/38.pdf
-
20
Authors:
Source: International Review on Computers & Software; Aug2013, Vol. 8 Issue 8, p1980-1990, 11p
Full Text Finder
Nájsť tento článok vo Web of Science