History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 66 total

On the complexity of the BKW algorithm on LWE. (English)
Des. Codes CryptographyDes. Codes Cryptography 74, N0. 2, 325-354(2015)
WorldCat.org
1
Determining near optimal base-stock levels in two-stage general inventory systems. (English)
Eur. J. Oper. Res. 232, No. 2, 342-349 (2014).
WorldCat.org
2
Block ciphers ‒ focus on the linear layer (feat. PRIDE). (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 57-76 (2014).
WorldCat.org
3
Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 446-464 (2014).
WorldCat.org
4
Lazy modulus switching for the BKW algorithm on LWE. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 429-445 (2014).
WorldCat.org
5
Lehren mit Learning Analytics - erste Erfahrungen mit dem Tool LeMolena. (English)
DeLFI, 290-293(2014)
WorldCat.org
6
NetworkPrioritizer: a versatile tool for network-based prioritization of candidate disease genes or other molecules. (English)
BioinformaticsBioinformatics 29, N0. 11, 1471-1473(2013)
WorldCat.org
7
On the Efficacy of Solving LWE by Reduction to Unique-SVP. (English)
ICISC, 293-310(2013)
WorldCat.org
8
Improvement of Formula and Uncertainty of the Reference Magnetic Field for AC Magnetometer Calibration. (English)
IEEE T. Instrumentation and MeasurementIEEE T. Instrumentation and Measurement 62, N0. 6, 1443-1449(2013)
WorldCat.org
9
Making work queue cluster-friendly for data intensive scientific applications. (English)
CLUSTER, 1-8(2013)
WorldCat.org
10
On the relation between the MXL family of algorithms and Gröbner basis algorithms. (English)
J. Symb. Comput. 47, No. 8, 926-941 (2012).
WorldCat.org
11
Dimming of LED LCD Backlights. (English)
Handbook of Visual Display Technology, 567-574(2012)
WorldCat.org
12
Novel search method for the discovery of functional relationships. (English)
BioinformaticsBioinformatics 28, N0. 2, 269-276(2012)
WorldCat.org
13
Conditional motion vector refinement for improved prediction. (English)
PCS, 497-500(2012)
WorldCat.org
14
The M4RIE library for dense linear algebra over small fields with even characteristic. (English)
ISSAC, 28-34(2012)
WorldCat.org
15
Breaking an identity-based encryption scheme based on DHIES. (English)
Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12‒15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 344-355 (2011).
WorldCat.org
16
Polly cracker, revisited. (English)
Lee, Dong Hoon (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4‒8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 179-196 (2011).
WorldCat.org
17
Algebraic precomputations in differential and integral cryptanalysis. (English)
Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20‒24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 387-403 (2011).
WorldCat.org
18
On cipher-dependent related-key attacks in the ideal-cipher model. (English)
Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13‒16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 128-145 (2011).
WorldCat.org
19
Cold boot key recovery by solving polynomial systems with noise. (English)
Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7‒10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 57-72 (2011).
WorldCat.org
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 66 total

Valid XHTML 1.0 Transitional Valid CSS!