Search Results - acm: e.: data/e.3: data encryption/e.3.0: code heating
-
1
Authors: et al.
Contributors: et al.
Source: EUROCRYPT 2012 ; https://inria.hal.science/hal-00864374 ; EUROCRYPT 2012, IACR, Apr 2012, Cambridge, United Kingdom. pp.502-519, ⟨10.1007/978-3-642-29011-4_30⟩ ; http://link.springer.com/chapter/10.1007%2F978-3-642-29011-4_30
Subject Terms: Fully-homomorphic encryption, cryptanalysis, approximate gcd, ACM: E.: Data/E.3: DATA ENCRYPTION/E.3.0: Code breaking, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Subject Geographic: Cambridge, United Kingdom
-
2
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607289 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.47-56
Subject Terms: Identifying code, optimal code, hexagonal grid, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607289; https://hal.inria.fr/inria-00607289; https://hal.inria.fr/inria-00607289/document; https://hal.inria.fr/inria-00607289/file/45.pdf
-
3
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00608102 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.183-192
Subject Terms: gaps of a code, Berger-Loidreau cryptosystem, square code, GRS codes, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00608102; https://hal.inria.fr/inria-00608102; https://hal.inria.fr/inria-00608102/document; https://hal.inria.fr/inria-00608102/file/117.pdf
-
4
Authors:
Contributors:
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607291 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.57-62
Subject Terms: Linear codes, Projective spaces, Small weight codewords, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: inria-00607291; https://hal.inria.fr/inria-00607291; https://hal.inria.fr/inria-00607291/document; https://hal.inria.fr/inria-00607291/file/53.pdf
-
5
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607730 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.91-100
Subject Terms: Ring-Linear Codes, MacWilliams' Equivalence Theorem, Extension Theorem, Weights, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607730; https://hal.inria.fr/inria-00607730; https://hal.inria.fr/inria-00607730/document; https://hal.inria.fr/inria-00607730/file/137.pdf
-
6
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://inria.hal.science/inria-00608107 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.193-202
Subject Terms: permutation group, subcode, idempotent subcode, de- coding, Goppa code, quasi-cyclic code, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
-
7
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00614257 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.273-282
Subject Terms: Affine-variety codes, linear code, distance, minimum-weight word, Hermitian code, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00614257; https://hal.inria.fr/inria-00614257; https://hal.inria.fr/inria-00614257/document; https://hal.inria.fr/inria-00614257/file/44.pdf
-
8
Authors: et al.
Source: DAC: Annual ACM/IEEE Design Automation Conference; Jun2016, p440-445, 6p
Subject Terms: DATA encryption, CODE reuse, COMPUTER security, COMPUTER architecture, COMPUTER programming
-
9
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607733 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.101-110
Subject Terms: module of solutions, negacyclic code, integers modulo 4, Lee metric, Galois Ring, decoding, Grobner bases, key equation, solution by approximations, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607733; https://hal.inria.fr/inria-00607733; https://hal.inria.fr/inria-00607733/document; https://hal.inria.fr/inria-00607733/file/66.pdf
-
10
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00614246 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.263-272
Subject Terms: Affine variety code, list decoding, multiplicity, Schwartz- Zippel bound, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00614246; https://hal.inria.fr/inria-00614246; https://hal.inria.fr/inria-00614246/document; https://hal.inria.fr/inria-00614246/file/82.pdf
-
11
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00614390 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.331-340
Subject Terms: Code, symmetric error, limited magnitude error, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00614390; https://hal.inria.fr/inria-00614390; https://hal.inria.fr/inria-00614390/document; https://hal.inria.fr/inria-00614390/file/38.pdf
-
12
Authors:
Source: ACM Computing Surveys; Apr2014, Vol. 46 Issue 4, p53:1-53:26, 26p, 5 Diagrams, 1 Chart
Subject Terms: DATA encryption, COMPUTER operating systems, COMPUTER hacking, COPROCESSORS, DATA protection
-
13
Authors:
Source: International Review on Computers & Software; Aug2013, Vol. 8 Issue 8, p1980-1990, 11p
-
14
Authors: et al.
Source: IEEE Design & Test of Computers; Sep/Oct2004, Vol. 21 Issue 5, p406-415, 10p, 5 Color Photographs, 1 Diagram, 2 Charts, 10 Graphs
Subject Terms: MULTIMEDIA systems, DATA encryption, DATA compression, COMPUTER engineering, COMPUTER architecture
-
15
Authors:
Source: Discover Public Health; 4/5/2025, Vol. 22 Issue 1, p1-29, 29p
-
16
Authors: et al.
Source: ACM Transactions on Privacy & Security; May2022, Vol. 25 Issue 3, p1-36, 36p
-
17
A New Source Coding Scheme with Small Expected Length and Its Application to Simple Data Encryption.
Authors:
Source: IEEE Transactions on Computers; Oct2006, Vol. 55 Issue 10, p1300-1305, 6p, 2 Diagrams, 2 Charts
-
18
Authors: et al.
Source: IEEE Transactions on Computer-Aided Design of Integrated Circuits & Systems; Jul2018, Vol. 37 Issue 7, p1358-1369, 12p
Subject Terms: COMPUTER security, DATA encryption, COMPUTER architecture, CYBERTERRORISM, COMPUTER performance
-
19
Authors: et al.
Source: International Journal of Information Security; Feb2015, Vol. 14 Issue 1, p85-99, 15p
-
20
Authors: et al.
Source: IEEE Transactions on Knowledge & Data Engineering; Jan2019, Vol. 31 Issue 1, p105-119, 15p
Subject Terms: DATA analysis, BIG data, PREDICTION markets, DATA encryption, CONFIDENTIAL communications
Nájsť tento článok vo Web of Science
Full Text Finder