The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "IMACC"( http://dblp.L3S.de/Venues/IMACC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ima

Publication years (Num. hits)
1995 (31) 1997 (36) 1999 (36) 2001 (39) 2003 (30) 2005 (30) 2007 (25) 2009 (29) 2011 (29) 2013 (21) 2015 (20) 2017 (20) 2019 (18) 2021 (15) 2023-2024 (15)
Publication types (Num. hits)
inproceedings(379) proceedings(15)
Venues (Conferences, Journals, ...)
IMACC(394)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 141 occurrences of 116 keywords

Results
Found 394 publication records. Showing 394 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Manuel Barbosa, Pooya Farshim Efficient Identity-Based Key Encapsulation to Multiple Parties. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key Encapsulation Mechanism (KEM), Provable Security, Identity Based Cryptography, Hybrid Encryption
1Neal Koblitz, Alfred Menezes Pairing-Based Cryptography at High Security Levels. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Carlos Cid, Sean Murphy, Matthew J. B. Robshaw An Algebraic Framework for Cipher Embeddings. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Chris J. Mitchell Partial Key Recovery Attacks on XCBC, TMAC and OMAC. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Canhui Cai, Jing Chen 0001 Tessellation Based Multiple Description Coding. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Andrew Brown 0003, Lorenz Minder, Amin Shokrollahi Improved Decoding of Interleaved AG Codes. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Woo Tae Kim, Se H. Kang, Eon Kyeong Joo Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1An Braeken, Bart Preneel Probabilistic Algebraic Attacks. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Walsh spectrum, combination and filter generator, Algebraic attack, algebraic immunity, annihilator
1Jintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf, Zhijun Yin Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Gröbner basis, public-key, perturbation, multivariate, quadratic polynomials
1Ueli M. Maurer, Johan Sjödin Domain Expansion of MACs: Alternative Uses of the FIL-MAC. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF arbitrary-input-length (AIL), variable-input-length (VIL), fixed-input-length (FIL), Message authentication code (MAC)
1Steven D. Galbraith, James F. McKee Pairings on Elliptic Curves over Finite Commutative Rings. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Germán Sáez On Threshold Self-healing Key Distribution Schemes. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1C. Dods, Nigel P. Smart, Martijn Stam Hash Based Digital Signature Schemes. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kamel Bentahar The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF DHP-DLP equivalence, Elliptic Curve Cryptosystems
1Liqun Chen 0002, Zhaohui Cheng Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Exploiting Coding Theory for Collision Attacks on SHA-1. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF low-weight vector, cryptanalysis, hash function, collision, Linear code, SHA-1
1Goce Jakimoski Unconditionally Secure Information Authentication in Presence of Erasures. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF erasure- resilient codes, erasure-tolerant authentication, message authentication, authentication codes
1An Braeken, Christopher Wolf, Bart Preneel Normality of Vectorial Functions. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF propagation characteristics, APN, algorithm, Cryptography, AES, normality, S-box
1Andrey Sidorenko, Berry Schoenmakers Concrete Security of the Blum-Blum-Shub Pseudorandom Generator. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mustapha Hedabou Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ?–adic method, precomputed table, Side Channel Attacks, Elliptic curve, scalar multiplication, Frobenius map
1Hans Georg Schaathun, Gérard D. Cohen A Trellis-Based Bound on (2, 1)-Separating Codes. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF coding bounds, separating codes, Trellis
1Manuel Barbosa, Dan Page On the Automatic Construction of Indistinguishable Operations. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Indistinguishable Operations, Countermeasures, Simple Power Analysis, Side-channel Cryptanalysis
1Alexander W. Dent A Designer's Guide to KEMs. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Eike Kiltz, John Malone-Lee A General Construction of IND-CCA2 Secure Public Key Encryption. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Geraint Price A General Attack Model on Hash-Based Client Puzzles. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Dae Hyun Yum, Pil Joong Lee Efficient Key Updating Signature Schemes Based on IBS. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key insulated signature, intrusion resilient siganture, identity based signature
1George Petrides Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Patrick Guy Farrell Recent Developments in Array Error-Control Codes: (Invited Paper). Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Werner Schindler A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF True (physical) random number generator, AIS 31, entropy, stochastical model
1Werner Schindler, Colin D. Walter More Detail for a Combined Timing and Power Attack against Implementations of RSA. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF statistical decision problem, power analysis, exponentiation, timing attack, RSA cryptosystem, side channel leakage, Montgomery modular multiplication
1Eirik Rosnes, Øyvind Ytrehus High Rate Convolutional Codes with Optimal Cycle Weights. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Enes Pasalic Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Boolean Function, Resiliency, Nonlinearity, Algebraic Degree
1Håvard Molland, John Erik Mathiassen, Tor Helleseth Improved Fast Correlation Attack Using Low Rate Codes. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Tetsu Iwata, Kaoru Kurosawa On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida Analysis of Double Block Length Hash Functions. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yuri L. Borissov, An Braeken, Svetla Nikova, Bart Preneel On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Kathy J. Horadam Differential Uniformity for Arrays. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Harald Niederreiter, Igor E. Shparlinski Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Katharina Geißler, Nigel P. Smart Computing the M = U Ut Integer Matrix Decomposition. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF NTRU, Lattice based cryptography
1Andreas J. Winter 0002, Anderson C. A. Nascimento, Hideki Imai Commitment Capacity of Discrete Memoryless Channels. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Andrew J. Holt, James H. Davenport Resolving Large Prime(s) Variants for Discrete Logarithm Computation. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Robert Granger Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Kenneth G. Paterson (eds.) Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Simon R. Blackburn, Domingo Gómez-Pérez, Jaime Gutierrez 0001, Igor E. Shparlinski Predicting the Inversive Generator. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Sattam S. Al-Riyami, Kenneth G. Paterson Tripartite Authenticated Key Agreement Protocols from Pairings. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Hans Georg Schaathun, Tor Helleseth Separating and Intersecting Properties of BCH and Kasami Codes. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF separating systems, Kasami codes, fingerprinting, BCH codes
1Lina Fagoonee, Bahram Honary A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Richard Walton Uses and Abuses of Cryptography (Invited Paper). Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Valtteri Niemi Cryptography in Wireless Standards: (Invited Paper). Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Thomas Johansson 0001 Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Chris J. Mitchell Remote User Authentication Using Public Information. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Adam Barnett, Nigel P. Smart Mental Poker Revisited. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng 0001 Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF ciphertext validity, OAEP-RSA, Encryption, provable security, chosen-ciphertext security, ElGamal encryption
1Konstantinos Rantos, Chris J. Mitchell Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF interoperability, Key recovery, negotiation protocol
1Matthew Geoffrey Parker Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Marc Joye, Jean-Jacques Quisquater On Rabin-Type Signatures. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Rabin-type systems, signature forgeries, digital signatures, factorization
1Maki Yoshida, Toru Fujiwara Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Willi Geiselmann, Rainer Steinwandt, Thomas Beth Attacking the Affine Parts of SFLASH. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Shujun Li, Qi Li, Wenmin Li, Xuanqin Mou, Yuanlong Cai Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Werner Schindler, François Koeune, Jean-Jacques Quisquater Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Error detection, error correction, timing attack, power attack
1Jort van Mourik, David Saad, Yoshiyuki Kabashima Weight vs. Magnetization Enumerator for Gallager Codes. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Clifford C. Cocks An Identity Based Encryption Scheme Based on Quadratic Residues. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Lee Jongkook, Ryu Shiryong, Kim Jeungseop, Yoo Keeyoung A New Undeniable Signature Scheme Using Smart Cards. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Bahram Honary (eds.) Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Alexandr Y. Lev, Yuliy A. Lev, Vyacheslav N. Okhrymenko Non-binary Block Inseparable Errors Control Codes. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Geeke Muurling Another Way of Doing RSA Cryptography in Hardware. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF MultiPrime, scalability, performance model, systolic array, Chinese Remainder Theorem, Montgomery multiplication, modular exponentiation
1Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Cyril Prissette Unconditionally Secure Key Agreement Protocol. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1J. T. Paire, Paul Coulton, Patrick Guy Farrell Graph Configurations and Decoding Performance. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1F. Javier Galán-Simón, Edgar Martínez-Moro, Juan Tena Ayuso Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Christoph Lange 0001, Andreas Ahrens On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Simon Hirst, Bahram Honary A Simple Soft-Input/Soft-Output Decoder for Hamming Codes. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Joan Daemen, Vincent Rijmen The Wide Trail Design Strategy. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Viktoriya Masol Investigation of Linear Codes Possessing Some Extra Properties. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Nigel P. Smart The Exact Security of ECIES in the Generic Group Model. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Eric Filiol, Caroline Fontaine A New Ultrafast Stream Cipher Design: COS Ciphers. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF vectorized cipher, high speed encryption, Boolean functions, stream cipher, block cipher, nonlinear feedback shift register
1Seyed J. Tabatabaian, Sam Ikeshiro, Murat Gumussoy, Mungal S. Dhanda A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Paul A. Crouch, James H. Davenport Lattice Attacks on RSA-Encrypted IP and TCP. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Sabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Boolean functions, stream ciphers, Fourier transform, Viterbi algorithm, filter generator
1Manfred von Willich A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Irfan Siap The Complete Weight Enumerator for Codes over Mn×s(Fq). Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Niklas Borselius, Chris J. Mitchell, Aaron Wilson Undetachable Threshold Signatures. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1David Saad, Yoshiyuki Kabashima, Tatsuto Murayama, Renato Vicente Statistical Physics of Low Density Parity Check Error Correcting Codes. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Svetla Nikova, Ventzislav Nikov Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric Spaces. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Phillip Benachour, Patrick Guy Farrell, Bahram Honary A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1David J. C. MacKay Almost-Certainly Runlength-Limiting Codes. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Karl Brincat, Chris J. Mitchell Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF cryptographic API, cryptanalysis, Message Authentication Code
1A. Kh. Al Jabri A Statistical Decoding Algorithm for General Linear Block Codes. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF General Linear Block Codes, McEliece System, Statistical, Decoding
1Ahmed Al-Dabbagh, Michael Darnell The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1N. Komninos, Bahram Honary, Michael Darnell An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Kenneth J. Giuliani, Guang Gong Generating Large Instances of the Gong-Harn Cryptosystem. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Jihye Gwak, Sooyoung Kim Shin, Hyung-Myung Kim Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Steven D. Galbraith, Nigel P. Smart A Cryptographic Application of Weil Descent. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Helen Donelan, Timothy O'Farrell A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Svetla Nikova, Ventzislav Nikov Some Applications of Bounds for Designs to the Cryptography. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Min-seok Oh, Peter Sweeney Low Complexity Soft-Decision Sequential Decoding Using Hybrid Permutation for Reed-Solomon Codes. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Yi Mu 0001, Vijay Varadharajan, Khanh Quoc Nguyen Delegated Decryption. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Thumrongrat Amornraksa, David R. B. Burgess, Peter Sweeney An Encoding Scheme for Dual Level Access to Broadcasting Networks. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Graham H. Norton, Ana Salagean On Efficient Decoding of Alternant Codes over a Commutative Ring. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Patrick Guy Farrell, Seyed H. Razavi Graph Decoding of Array Error-Correcting Codes. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 394 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license