History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 25 total

An exploration of affine group laws for elliptic curves. (English)
J. Math. Cryptol. 5, No. 1, 1-50 (2011).
WorldCat.org
1
Jacobi quartic curves revisited. (English)
Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1‒3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 452-468 (2009).
WorldCat.org
2
Twisted Edwards curves revisited. (English)
Pieprzyk, Josef (ed.), Advances in cryptology ‒ ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7‒11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 326-343 (2008).
WorldCat.org
3
Set-based complexity and biological information. (English)
Comput. Res. Repos. 2008, Article No. 0801.4024 (2008).
WorldCat.org
4
New formulae for efficient elliptic curve arithmetic. (English)
Srinathan, K. (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2007. 8th international conference on cryptology in India, Chennai, India, December 9‒13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77025-1/pbk). Lecture Notes in Computer Science 4859, 138-151 (2007).
WorldCat.org
5
Implementation of extension field arithmetic with applications to torus-based cryptography. (English)
Dorfer, G. (ed.) et al., Proceedings of the 70th workshop on general algebra “70. Arbeitstagung Allgemeine Algebra", Vienna, Austria, May 26‒29, 2005. Klagenfurt: Verlag Johannes Heyn (ISBN 3-7084-0194-8/pbk). Contributions to General Algebra 17, 201-216 (2006).
WorldCat.org
6
Time dependent neural network models for detecting changes of state in complex processes: applications in earth sciences and astronomy. (English)
Neural Netw. 19, No. 2, 196-207 (2006).
WorldCat.org
7
RAK factoring algorithm. (English)
Australas. J. Comb. 33, 291-305 (2005).
WorldCat.org
8
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. (English)
Int. J. Inf. Secur. 3, No. 2, 86-98 (2004).
WorldCat.org
9
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. (English)
Int. J. Inf. Secur. 3, No. 2, 86-98 (2004).
WorldCat.org
10
The security of fixed versus random elliptic curves in cryptography. (English)
Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9‒11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 55-66 (2003).
WorldCat.org
11
Strengthening the key schedule of the AES. (English)
Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 226-240 (2002).
Classification: E.3 E.4
WorldCat.org
12
Efficient methods for generating MARS-like s-boxes. (English)
Schneier, Bruce (ed.), Fast software encryption. 7th international workshop, FSE 2000, New York, NY, USA, April 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1978, 300-313 (2001).
WorldCat.org
13
Evolutionary heuristics for finding cryptographically strong S-boxes. (English)
Varadharajan, Vijay (ed.) et al., Information and communication security. 2nd international conference, ICICS ’99, Sydney, Australia, November 9-11, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1726, 263-274 (1999).
Classification: E.4
WorldCat.org
14
Key schedules of iterative block ciphers. (English)
Boyd, Colin (ed.) et al., Information security and privacy. 3rd Australasian conference, ACISP ’98, Brisbane, Australia, July 13‒15, 1998. Proceedings. Berlin: Springer (ISBN 3-540-64732-5). Lect. Notes Comput. Sci. 1438, 80-89 (1998).
WorldCat.org
15
DESV-1: A variation of the data encryption standard (DES). (English)
Pieprzyk, Josef (ed.) et al., Advances in cryptology - ASIACRYPT ’94. 4th international conference on the theory and applications of cryptology, Wollongong, Australia, November 28 - December 1, 1994. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 917, 427-430 (1995).
WorldCat.org
16
Aspects of linear complexity. (English)
Blahut, Richard E. (ed.) et al., Communications and cryptography. Two sides of one tapestry. Symposium on Communications, coding, and cryptography in honor of James L. Massey on the occasion of his 60th birthday, Centro Stefano Franscini, Ascona, Switzerland, February 10-14, 1994. Boston, MA: Kluwer Academic Publishers. Kluwer Int. Ser. Eng. Comput. Sci. 276, 35-42 (1994).
WorldCat.org
17
Building organizational decision support systems. A RAND research study. (English)
Boston: Academic Press, Inc.. XXIII, 358 p. (1992).
WorldCat.org
18
Enumeration results on linear complexity profiles. (English)
Cryptography and coding, Proc. 2nd Conf., Cirencester/UK 1989, Inst. Math. Appl. Conf. Ser., New Ser. 33, 23-34 (1992).
WorldCat.org
19
Introduction to the theory and practice of econometrics. 2nd ed. (English)
New York: John Wiley \& Sons, Inc. xxxviii, 1024 p. \$ 59. 95 (1988).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 25 total

Valid XHTML 1.0 Transitional Valid CSS!