The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "C2SI"( http://dblp.L3S.de/Venues/C2SI )

URL (DBLP): http://dblp.uni-trier.de/db/conf/c2si

Publication years (Num. hits)
2015 (30) 2017 (25) 2019 (28) 2023 (25)
Publication types (Num. hits)
inproceedings(104) proceedings(4)
Venues (Conferences, Journals, ...)
C2SI(108)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 108 publication records. Showing 108 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Hussain Ahmad, Carolin Hannusch A New Keyed Hash Function Based on Latin Squares and Error-Correcting Codes to Authenticate Users in Smart Home Environments. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Theo Fanuela Prabowo, Chik How Tan Attack on a Code-Based Signature Scheme from QC-LDPC Codes. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Maya Chartouny, Jacques Patarin, Ambre Toulemonde Quantum Cryptanalysis of 5 Rounds Feistel Schemes and Benes Schemes. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Mridul Nandi, Sayantan Paul, Abishanka Saha Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Binh Le Thanh Thai, Hidema Tanaka A Study for Security of Visual Cryptography. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Vikas Kumar, Bimal Mandal, Aditi Kar Gangopadhyay, Sugata Gangopadhyay Computational Results on Gowers U2 and U3 Norms of Known S-Boxes. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Grigor Artem, Vincenzo Iovino, Razvan Rosie Multi-input Non-interactive Functional Encryption: Constructions and Applications. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Tomohiro Sekiguchi, Hidema Tanaka Security Enhancement Method Using Shortened Error Correcting Codes. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Nuh Aydin, Yiyang Lu, Vishad R. Onta An Updated Database of $\mathbb {Z}_4$ Codes and an Open Problem About Quasi-cyclic Codes. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Agnese Gini, Pierrick Méaux Weightwise Perfectly Balanced Functions and Nonlinearity. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Said El Hajji 0001, Sihem Mesnager, El Mamoun Souidi (eds.) Codes, Cryptology and Information Security - 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt Cryptologists Should Not Ignore the History of Al-Andalusia. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Evgnosia-Alexandra Kelesidis, Diana Maimut, Ilona Teodora Ciocan Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Loïc Bidoux, Philippe Gaborit Compact Post-quantum Signatures from Proofs of Knowledge Leveraging Structure for the sfPKP, sfSD and sfRSD Problems. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji Lattice-Based Accumulator with Constant Time List Update and Constant Time Verification. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ousmane Ndiaye Moderate Classical McEliece Keys from Quasi-Centrosymmetric Goppa Codes. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Hind Idrissi, Mohammed Ennahbaoui An Enhanced Anonymous ECC-Based Authentication for Lightweight Application in TMIS. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jannis Leuther, Stefan Lucks QCB is Blindly Unforgeable. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ruize Wang, Elena Dubrova A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Vladimir Edemskiy, Sofia Koltsova Symmetric 4-Adic Complexity of Quaternary Generalized Cyclotomic Sequences of Order Four with Period 2pn. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Callum McLoughlin, Clémentine Gritti, Juliet Samandari Full Post-Quantum Datagram TLS Handshake in the Internet of Things. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Nadir Sahllal, El Mamoun Souidi Forecasting Click Fraud via Machine Learning Algorithms. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Phung Minh Ngoc, Mamoru Mimura Malicious JavaScript Detection Based on AST Analysis and Key Feature Re-sampling in Realistic Environments. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1David Naccache, Ofer Yifrach-Stav On Catalan Constant Continued Fractions. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Stéphane Ballet, Bastien Pacifico Chudnovsky-Type Algorithms over the Projective Line Using Generalized Evaluation Maps. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Parthasarathi Das, Michael J. Jacobson Jr., Renate Scheidler Improved Efficiency of a Linearly Homomorphic Cryptosystem. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hairong Yi, Guiwen Luo, Dongdai Lin Faster Scalar Multiplication on the x-Line: Three-Dimensional GLV Method with Three-Dimensional Differential Addition Chains. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abdelmalek Azizi Arabic Cryptography and Steganography in Morocco. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad Speed-up of SCA Attacks on 32-bit Multiplications. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jingchen Yan, Yating Wang, Yuichi Goto, Jingde Cheng An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Youssef Souissi, Adrien Facon, Sylvain Guilley Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi (eds.) Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sofiane Takarabt, Alexander Schaub 0001, Adrien Facon, Sylvain Guilley, Laurent Sauvage, Youssef Souissi, Yves Mathieu Cache-Timing Attacks Still Threaten IoT Devices. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1George Teseleanu Managing Your Kleptographic Subscription Plan. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Matthias Geihs, Lucas Schabhüser, Johannes Buchmann 0001 Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Terry Shue Chien Lau, Chik How Tan A New Gabidulin-Like Code and Its Application in Cryptography. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Vincenzo Iovino, Ivan Visconti Non-interactive Zero Knowledge Proofs in the Random Oracle Model. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gianpiero Cabodi, Paolo Camurati, Fabrizio F. Finocchiaro, Danilo Vendraminetto Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jintai Ding, Kevin Schmitt, Zheng Zhang A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay Construction for a Nominative Signature Scheme from Lattice with Enhanced Security. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Said El Hajji 0001, Nabil Moukafih, Ghizlane Orhanou Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sanyam Mehta, Vishal Saraswat, Smith Sen Secret Sharing Using Near-MDS Codes. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Grigory Kabatiansky On the Tracing Traitors Math - Dedicated to the Memory of Bob Blakley - Pioneer of Digital Fingerprinting and Inventor of Secret Sharing. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Brice Odilon Boidje, Cheikh Thiecoumba Gueye, Gilbert Ndollane Dione, Jean Belo Klamti Quasi-Dyadic Girault Identification Scheme. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gérald Gavin, Stéphane Bonnevay Securely Aggregating Testimonies with Threshold Multi-key FHE. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yongge Wang, Qutaibah M. Malluhi Reusable Garbled Turing Machines Without FHE. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sihem Mesnager On Good Polynomials over Finite Fields for Optimal Locally Recoverable Codes. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Augustin P. Sarr, Papa B. Seye, Togdé Ngarenon A Practical and Insider Secure Signcryption with Non-interactive Non-repudiation. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Martin Hell, Thomas Johansson 0001, Willi Meier, Jonathan Sönnerup, Hirotaka Yoshida An AEAD Variant of the Grain Stream Cipher. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Linru Zhang, Yuechen Chen, Jun Zhang 0049, Meiqi He, Siu-Ming Yiu From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Soukaina Belabssir, Edoukou Berenger Ayebie, El Mamoun Souidi Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum \pi -distance 3. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sihem Mesnager, Kübra Kaytanci, Ferruh Özbudak On Plateaued Functions, Linear Structures and Permutation Polynomials. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1George Teseleanu Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Aicha Batoul, Kenza Guenda, T. Aaron Gulliver, Nuh Aydin Constacyclic Codes over Finite Principal Ideal Rings. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Teng Wu, Yin Tan, Kalikinkar Mandal, Guang Gong On the Multi-output Filtering Model and Its Applications. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gerardo Vega, Jesús E. Cuén-Ramos The Weight Distribution for an Extended Family of Reducible Cyclic Codes. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fengrong Zhang, Enes Pasalic, Nastja Cepak, Yongzhuang Wei Bent Functions in C and D Outside the Completed Maiorana-McFarland Class. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou A Median Nearest Neighbors LDA for Anomaly Network Detection. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun 0005 Some Results on the Known Classes of Quadratic APN Functions. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sylvain Guilley, Annelie Heuser, Olivier Rioul Codes for Side-Channel Attacks and Protections. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Abdoul Aziz Ciss, Djiby Sow Two-Source Randomness Extractors for Elliptic Curves for Authenticated Key Exchange. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Cunsheng Ding, Zhengchun Zhou Parameters of 2-Designs from Some BCH Codes. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pierre-Louis Cayrel, Cheikh Thiecoumba Gueye, El Hadji Modou Mboup, Ousmane Ndiaye, Edoardo Persichetti Efficient Implementation of Hybrid Encryption from Coding Theory. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Philippe Guillot, Gilles Millérioux, Brandon Dravie, Nadia El Mrabet Spectral Approach for Correlation Power Analysis. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Claude Carlet, Sihem Mesnager, Ferruh Özbudak, Ahmet Sinak Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sugata Gangopadhyay, Subhamoy Maitra, Nishant Sinha 0003, Pantelimon Stanica Quantum Algorithms Related to \textitHN -Transforms of Boolean Functions. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aicha Batoul, Kenza Guenda, T. Aaron Gulliver, Nuh Aydin On Isodual Cyclic Codes over Finite Chain Rings. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Said El Hajji 0001, Abderrahmane Nitaj, El Mamoun Souidi (eds.) Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Guillaume Bonnoron, Caroline Fontaine, Guy Gogniat, Vincent Herbert, Vianney Lapôtre, Vincent Migliore, Adeline Roux-Langlois Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thierry P. Berger, Cheikh Thiécoumba Gueye, Jean Belo Klamti A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sihem Mesnager, Pinar Ongan, Ferruh Özbudak New Bent Functions from Permutations and Linear Translators. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Berenger Edoukou Ayebie, Hafsa Assidi, El Mamoun Souidi A New Dynamic Code-Based Group Signature Scheme. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi Revisiting the Efficient Key Generation of ZHFE. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hind Idrissi, Mohammed Ennahbaoui, Said El Hajji 0001, El Mamoun Souidi A Secure Cloud-Based IDPS Using Cryptographic Traces and Revocation Protocol. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1María Isabel García-Planas Families of Convolutional Codes over Finite Fields: A Survey. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hanane Bennasar, Ahmed Bendahmane, Mohammed Essaaidi An Overview of the State-of-the-Art of Cloud Computing Cyber-Security. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Patrick Struck, Lucas Schabhüser, Denise Demirel, Johannes Buchmann 0001 Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Cheikh Thiécoumba Gueye, Jean Belo Klamti, Shoichi Hirose Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field \mathbb F_q. Search on Bibsonomy C2SI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Manel Abdelhedi, Omessaad Hamdi, Ammar Bouallegue Performance of LDPC Decoding Algorithms with a Statistical Physics Theory Approach. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Abderrahmane Nitaj, Tajjeeddine Rachidi New Attacks on RSA with Moduli N = p r q. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Faisal Nasim, Baber Aslam, Waseem Ahmed, Talha Naeem Uncovering Self Code Modification in Android. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marwa Ziadia, Mohamed Mejri Formal Enforcement of Security Policies on Parallel Systems with Risk Integration. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anne Canteaut, Joëlle Roué Differential Attacks Against SPN: A Thorough Analysis. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Claude Carlet On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Abderrahmane Nitaj, Tajjeeddine Rachidi Factoring RSA Moduli with Weak Prime Factors. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Riham AlTawy, Mohamed Tolba, Amr M. Youssef A Higher Order Key Partitioning Attack with Application to LBlock. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Matthias Geihs, Denise Demirel, Johannes Buchmann 0001 On the Security of Long-Lived Archiving Systems Based on the Evidence Record Syntax. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Huihui Yang, Vladimir A. Oleshchuk A Dynamic Attribute-Based Authentication Scheme. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thierry P. Berger, Nora El Amrani Codes over L(GF(2)m, GF(2)m) , MDS Diffusion Matrices and Cryptographic Applications. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Delphine Boucher A Note on the Existence of Self-Dual Skew Codes over Finite Fields. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ezedin Barka, Sujith Samuel Mathew, Yacine Atif Securing the Web of Things with Role-Based Access Control. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Noreddine El Janati El Idrissi, Said El Hajji 0001, Jean-Louis Lanet Countermeasures Mitigation for Designing Rich Shell Code in Java Card. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Said El Hajji 0001, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi (eds.) Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maleika Heenaye-Mamode Khan Representation of Dorsal Hand Vein Pattern Using Local Binary Patterns (LBP). Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Felix Ulmer Extended Abstract: Codes as Modules over Skew Polynomial Rings. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nadia El Mrabet, Emmanuel Fouotsa Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aicha Batoul, Kenza Guenda, T. Aaron Gulliver Repeated-Root Isodual Cyclic Codes over Finite Fields. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jesús Carrillo-Pacheco, Gerardo Vega, Felipe Zaldívar The Weight Distribution of a Family of Lagrangian-Grassmannian Codes. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Noureddine Chikouche, Cherif Foudil, Pierre-Louis Cayrel, Mohamed Benmohammed Weaknesses in Two RFID Authentication Protocols. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thierry P. Berger, Julien Francq, Marine Minier CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask. Search on Bibsonomy C2SI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 108 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license