History
1
106
Year:
-
Type:
Journal
Book
Article
Please fill in your query. A complete syntax description you will find on the General Help page.

Result 81 to 100 from 106 total

Partial key exposure attacks on RSA up to full size exponents. (English)
Cramer, Ronald (ed.), Advances in cryptology ‒ EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22‒26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 371-386 (2005).
WorldCat.org
81
A tool kit for finding small roots of bivariate polynomials over the integers. (English)
Cramer, Ronald (ed.), Advances in cryptology ‒ EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22‒26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 251-267 (2005).
WorldCat.org
82
Opportunities and challenges for location aware computing in the construction industry. (English)
Mobile HCI, 255-258(2005)
WorldCat.org
83
Secret exponent attacks on RSA-type schemes with moduli $N=p^rq$. (English)
Bao, Feng (ed.) et al., Public key cryptography ‒ PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1‒4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 218-230 (2004).
WorldCat.org
84
A generalized Wiener attack on RSA. (English)
Bao, Feng (ed.) et al., Public key cryptography ‒ PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1‒4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 1-13 (2004).
WorldCat.org
85
Computing the RSA secret key is deterministic polynomial time equivalent to factoring. (English)
Franklin, Matt (ed.), Advances in cryptology ‒ CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15‒19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 213-219 (2004).
WorldCat.org
86
The Use of Landmarks in Pedestrian Navigation Instructions and the Effects of Context. (English)
Mobile HCI, 300-304(2004)
WorldCat.org
87
Pedestrian navigation aids: Information requirements and design implications. (English)
Pers. Ubiquitous Comput 7, No. 6, 331-338 (2003).
WorldCat.org
88
New partial key exposure attacks on RSA. (English)
Boneh, Dan (ed.), Advances in cryptology ‒ CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17‒21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 27-43 (2003).
WorldCat.org
89
Cryptanalysis of unbalanced RSA with small CRT-exponent. (English)
Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 242-256 (2002).
Classification: E.4
WorldCat.org
91
Threading Using Neural nEtwork (TUNE): the measure of protein sequence-structure compatibility. (English)
Bioinformatics 18, N0. 10, 1350-1357(2002)
WorldCat.org
92
David Rosenboom: Invisible Gold Compact disc, 2000, Pogus 21022-2; available from Pogus Productions, 50 Ayr Road, Chester, New York 10918-2409, USA; fax (509) 357-4319; electronic mail pogal@pogus.com; World Wide Web www.pogus.com. (English)
Computer Music Journal 26, N0. 2, 102-103(2002)
WorldCat.org
93
User-centred evaluation of complex IT\&T within an operational environment. (English)
J. Res. Pract. Inf. Technol. 33, No. 1, 83-97 (2001).
WorldCat.org
94
Key revocation with interval cover families. (English)
Vaudenay, Serge (ed.) et al., Selected areas in cryptography. 8th annual international workshop, SAC 2001, Toronto, Ontario, Canada, August 16‒17, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43066-0). Lect. Notes Comput. Sci. 2259, 325-341 (2001).
WorldCat.org
95
Dimension reduction methods for convolution modular lattices. (English)
Silverman, Joseph H. (ed.), Cryptography and lattices. 1st international conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2146, 110-125 (2001).
WorldCat.org
96
Low secret exponent RSA revisited. (English)
Silverman, Joseph H. (ed.), Cryptography and lattices. 1st international conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2146, 4-19 (2001).
WorldCat.org
97
Amino Acid Substitution Matrices from an Artificial Neural Network Model. (English)
Journal of Computational Biology 8, N0. 5, 471-481(2001)
WorldCat.org
98
Diffusion driven instability in an inhomogeneous circular domain. (English)
Math. Comput. Modelling 29, No.4, 53-66 (1999).
Classification: I.6
WorldCat.org
99
Interfaz JDBC para un Sistema de Administración de Bases de Datos Distribuidas. (English)
JISBD, 59-60(1999)
WorldCat.org
100

Result 81 to 100 from 106 total

Valid XHTML 1.0 Transitional Valid CSS!