History
1
252


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 252 total

Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64. (English)
Cryptogr. Commun. 6, No. 4, 313-333 (2014).
WorldCat.org
1
Generation of TPMACA for pattern classification. (English)
W\c{a}s, Jarosław (ed.) et al., Cellular automata. 11th international conference on cellular automata for research and industry, ACRI 2014, Krakow, Poland, September 22‒25, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11519-1/pbk). Lecture Notes in Computer Science 8751, 408-416 (2014).
WorldCat.org
2
Optimal parameters for the WG stream cipher family. (English)
Cryptogr. Commun. 6, No. 2, 117-135 (2014).
WorldCat.org
3
Visual attention computation in video of driving environment. (English)
ICME, 1-6(2014)
WorldCat.org
4
A supportive architecture for CFD-based design optimisation. (English)
Enterprise ISEnterprise IS 8, N0. 2, 246-278(2014)
WorldCat.org
5
A new efficient physical layer OFDM encryption scheme. (English)
INFOCOM, 1024-1032(2014)
WorldCat.org
6
A unified method for finding impossible differentials of block cipher structures. (English)
Inf. Sci.Inf. Sci. 263, 211-220(2014)
WorldCat.org
7
Structural degree predicts functional network connectivity: A multimodal resting-state fMRI and MEG study. (English)
NeuroImageNeuroImage 97, 296-307(2014)
WorldCat.org
8
On the PMEPR of Binary Golay Sequences of Length $2^{n}$. (English)
IEEE Transactions on Information TheoryIEEE Transactions on Information Theory 60, N0. 4, 2391-2398(2014)
WorldCat.org
9
Loxin - A solution to password-less universal login. (English)
INFOCOM Workshops, 488-493(2014)
WorldCat.org
10
Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64. (English)
Cryptography and CommunicationsCryptography and Communications 6, N0. 4, 313-333(2014)
WorldCat.org
11
Generation of TPMACA for Pattern Classification. (English)
ACRI, 408-416(2014)
WorldCat.org
12
Inside Debt and the Design of Corporate Debt Contracts. (English)
Management ScienceManagement Science 60, N0. 5, 1260-1280(2014)
WorldCat.org
13
New Implementations of the WG Stream Cipher. (English)
IEEE Trans. VLSI Syst.IEEE Trans. VLSI Syst. 22, N0. 9, 1865-1878(2014)
WorldCat.org
14
Multi-agent based modeling and simulation of microscopic traffic in virtual reality system. (English)
Simulation Modelling Practice and TheorySimulation Modelling Practice and Theory 45, 62-79(2014)
WorldCat.org
15
A secure symmetric encryption scheme based on an obfuscator. (Chinese)
Acta Sci. Nat. Univ. Sunyatseni 52, No. 1, 7-11 (2013).
WorldCat.org
16
Correlation of binary sequence families derived from the multiplicative characters of finite fields. (English)
Adv. Math. Commun. 7, No. 4, 475-484 (2013).
WorldCat.org
17
Resilience to distinguishing attacks on WG-7 cipher and their generalizations. (English)
Cryptogr. Commun. 5, No. 4, 277-289 (2013).
WorldCat.org
18
Even periodic and odd periodic complementary sequence pairs from generalized Boolean functions. (English)
Adv. Math. Commun. 7, No. 2, 113-125 (2013).
WorldCat.org
19
The sorting index and permutation codes. (English)
Adv. Appl. Math. 50, No. 3, 367-389 (2013).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 252 total

Valid XHTML 1.0 Transitional Valid CSS!