History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 71 total

Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 446-464 (2014).
WorldCat.org
1
Lazy modulus switching for the BKW algorithm on LWE. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 429-445 (2014).
WorldCat.org
2
Block ciphers ‒ focus on the linear layer (feat. PRIDE). (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 57-76 (2014).
WorldCat.org
3
Determining near optimal base-stock levels in two-stage general inventory systems. (English)
European Journal of Operational ResearchEuropean Journal of Operational Research 232, N0. 2, 342-349(2014)
WorldCat.org
4
Block Ciphers - Focus on the Linear Layer (feat. PRIDE). (English)
CRYPTO (1), 57-76(2014)
WorldCat.org
5
Making work queue cluster-friendly for data intensive scientific applications. (English)
CLUSTER, 1-8(2013)
WorldCat.org
6
NetworkPrioritizer: a versatile tool for network-based prioritization of candidate disease genes or other molecules. (English)
BioinformaticsBioinformatics 29, N0. 11, 1471-1473(2013)
WorldCat.org
7
Exploring mobile representations of folksonomies to support the example context of a community gardening project. (English)
Mobile HCI, 528-533(2013)
WorldCat.org
8
On the Efficacy of Solving LWE by Reduction to Unique-SVP. (English)
ICISC, 293-310(2013)
WorldCat.org
9
Improvement of Formula and Uncertainty of the Reference Magnetic Field for AC Magnetometer Calibration. (English)
IEEE T. Instrumentation and MeasurementIEEE T. Instrumentation and Measurement 62, N0. 6, 1443-1449(2013)
WorldCat.org
10
On the relation between the MXL family of algorithms and Gröbner basis algorithms. (English)
J. Symb. Comput. 47, No. 8, 926-941 (2012).
WorldCat.org
11
Conditional motion vector refinement for improved prediction. (English)
PCS, 497-500(2012)
WorldCat.org
12
The M4RIE library for dense linear algebra over small fields with even characteristic. (English)
ISSAC, 28-34(2012)
WorldCat.org
13
Novel search method for the discovery of functional relationships. (English)
BioinformaticsBioinformatics 28, N0. 2, 269-276(2012)
WorldCat.org
14
Increasing the user’s attention on the web: using implicit interaction based on gaze behavior to tailor content. (English)
NordiCHI, 544-553(2012)
WorldCat.org
15
Dimming of LED LCD Backlights. (English)
Handbook of Visual Display Technology, 567-574(2012)
WorldCat.org
16
Breaking an identity-based encryption scheme based on DHIES. (English)
Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12‒15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 344-355 (2011).
WorldCat.org
17
Polly cracker, revisited. (English)
Lee, Dong Hoon (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4‒8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 179-196 (2011).
WorldCat.org
18
Algebraic precomputations in differential and integral cryptanalysis. (English)
Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20‒24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 387-403 (2011).
WorldCat.org
19
On cipher-dependent related-key attacks in the ideal-cipher model. (English)
Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13‒16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 128-145 (2011).
WorldCat.org
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 71 total

Valid XHTML 1.0 Transitional Valid CSS!