The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for round with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1958-1968 (15) 1969-1971 (15) 1972-1979 (17) 1980-1984 (20) 1985-1986 (19) 1987-1988 (19) 1989-1990 (38) 1991 (31) 1992 (31) 1993 (25) 1994 (36) 1995 (46) 1996 (42) 1997 (52) 1998 (65) 1999 (103) 2000 (152) 2001 (157) 2002 (218) 2003 (230) 2004 (289) 2005 (379) 2006 (406) 2007 (412) 2008 (406) 2009 (344) 2010 (177) 2011 (156) 2012 (137) 2013 (158) 2014 (169) 2015 (203) 2016 (220) 2017 (220) 2018 (209) 2019 (224) 2020 (306) 2021 (268) 2022 (278) 2023 (300) 2024 (73)
Publication types (Num. hits)
article(2640) book(1) incollection(16) inproceedings(3978) phdthesis(30)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3841 occurrences of 1930 keywords

Results
Found 6676 publication records. Showing 6665 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Hoeteck Wee One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Interactive hashing, statistically hiding commitments, black-box lower bounds
16Hidema Tanaka, Yasuo Hatano, Nobuyuki Sugio, Toshinobu Kaneko Security Analysis of MISTY1. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MISTY1, Higher order differential, Chosen plaintext attack
16Antonio Fernández Anta, Michel Raynal From an Intermittent Rotating Star to a Leader. Search on Bibsonomy OPODIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Assumption coverage, Eventual t-source, Moving source, Timely link, Fault-tolerance, Distributed algorithm, System model, Asynchronous system, Failure detector, Process crash, Partial synchrony, Omega, Message pattern, Eventual leader
16Rafael Pass, Muthuramakrishnan Venkitasubramaniam An efficient parallel repetition theorem for Arthur-Merlin games. Search on Bibsonomy STOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF computationally-sound arguments, public-coin protocols, proofs of knowledge, Arthur-Merlin games, parallel repetition
16Jonathan Katz On achieving the "best of both worlds" in secure multiparty computation. Search on Bibsonomy STOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure computation
16Ashkan Aazami, Michael D. Stilp Approximation Algorithms and Hardness for Domination with Propagation. Search on Bibsonomy APPROX-RANDOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Power Dominating Set, Approximation Algorithms, Integer Programming, Planar Graphs, Greedy Algorithms, Dominating Set, Hardness of Approximation, PTAS
16Jin Sun, Paul J. Weber, Byung Kyu Choi, Roger M. Kieckhafer DIMPLE: DynamIc Membership ProtocoL for epidemic protocols. Search on Bibsonomy BROADNETS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Michael Lampis, Valia Mitsou The Ferry Cover Problem. Search on Bibsonomy FUN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF wolf-goat-cabbage puzzle, approximation algorithms, graph algorithms, vertex cover, transportation problems
16Wenling Wu Pseudorandomness of Camellia-Like Scheme. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF random function, super-pseudorandomness, block cipher, pseudorandomness, Camellia
16Gilles Piret Luby-Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AMS Classification 94A60
16Alina Maor, Neri Merhav Two-way successively refined joint source-channel coding. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Kai Man Tsui, Shing-Chow Chan Error Analysis and Efficient Realization of the Multiplier-Less FFT-Like Transformation (ML-FFT) and Related Sinusoidal Transformations. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Radix-p Fast Fourier Transform (FFT), Multiplier-less approximation, Sum-of-Powers-of-two (SOPOT), Real-valued, Discrete W Transform (DWT), Implementation, Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Error analysis
16Shafi Goldwasser, Elan Pavlov, Vinod Vaikuntanathan Fault-Tolerant Distributed Computing in Full-Information Networks. Search on Bibsonomy FOCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Aggelos Kiayias, Antonina Mitrofanova Syntax-Driven Private Evaluation of Quantified Membership Queries. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Mohammad Zad-issa, Norbert Rossello, Laurent Pilati Methods for None Intrusive Delay Measurment for Audio Communication over Packet Networks. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Huafeng Liu, Liang Li, Shiyao Jin Cluster Number Variability Problem in LEACH. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Rachid Guerraoui, Marko Vukolic How fast can a very robust read be? Search on Bibsonomy PODC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF arbitrary failures, optimal resilience, storage emulations, time-complexity
16Sangwoon Yang, Jinsub Park, Younggap You The Smallest ARIA Module with 16-Bit Architecture. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, Low Power Design, ARIA
16Jean-Charles Faugère, Ludovic Perret Cryptanalysis of 2R- Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Functional Decomposition Problem (FDP), Gröbner bases, Cryptanalysis, F5 algorithm
16Amir Moradi 0001, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh A Generalized Method of Differential Fault Attack Against AES Cryptosystem. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Smart Card, AES, Side Channel Attacks, Fault Attacks
16Partha Dutta, Rachid Guerraoui The inherent price of indulgence. Search on Bibsonomy Distributed Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Keywors Fault tolerance, Consensus time complexity, Distributed algorithms
16Frank P. Kelly, Thomas Voice Stability of end-to-end algorithms for joint routing and rate control. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF scalable TCP, internet, dynamic routing
16Hirotaka Yoshida, Alex Biryukov Analysis of a SHA-256 Variant. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SHA-2-XOR, SHACAL-2-XOR, Pseudo-collision resistance, Iterative patterns, Differential cryptanalysis, SHA-256
16Hisao Ishibuchi, Naoki Namikawa Evolution of cooperative behavior in the iterated prisoner's dilemma under random pairing in game playing. Search on Bibsonomy Congress on Evolutionary Computation The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Petra Berenbrink, Tom Friedetzky, Russell A. Martin Dynamic Diffusion Load Balancing. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Bernard Chen 0001, Robert W. Harrison, Yi Pan 0001, Phang C. Tai Novel Hybrid Hierarchical-K-means Clustering Method (H-K-means) for Microarray Analysis. Search on Bibsonomy CSB Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Wook Choi, Sajal K. Das 0001 A novel framework for energy - conserving data gathering in wireless sensor networks. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Hao-Da Huang, Xian-Sheng Hua 0001, Shipeng Li 0001, Hong-Jiang Zhang Online End Detection for Live-Broadcast Sports TV Programs. Search on Bibsonomy ICME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Eli Biham, Orr Dunkelman, Nathan Keller Related-Key Boomerang and Rectangle Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Liqun Cheng, John B. Carter Fast Barriers for Scalable ccNUMA Systems. Search on Bibsonomy ICPP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Sampath Kameshwaran, Lyès Benyoucef, Xiaolan Xie Design of Progressive Auctions for Procurement Based on Lagrangian Relaxation. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Peng Zhang, Chengqing Ye, Xin Li, Xuying Ma An Efficient Keys Agreement for Multi-party's Communication. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Chuanxiong Guo SRR: an O(1) time-complexity packet scheduler for flows in multiservice packet networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF time complexity, packet scheduling, high-speed networks, end-to-end delay, fair queueing
16Prosenjit Bose, Pat Morin Testing the Quality of Manufactured Disks and Balls. Search on Bibsonomy Algorithmica The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Tolerancing metrology, Guaranteed quality, Testing, Sampling, Quality assurance, Roundness, Disks, Spheres, Cylinders
16Daniele Miorandi, Andrea Zanella, Gianfranco L. Pierobon Performance Evaluation of Bluetooth Polling Schemes: An Analytical Approach. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF polling schemes, equilibrium point analysis, performance evaluation, Bluetooth
16Gilles Piret, Jean-Jacques Quisquater Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Michael Scharf, Marc Necker, Bernd Gloss The Sensitivity of TCP to Sudden Delay Variations in Mobile Networks. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Liam Keliher Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SPN, MELP, MEDP, KMT2, KMT2-DC, AES, provable security, differential cryptanalysis, Rijndael, linear cryptanalysis
16Craig Gentry, Zulfikar Ramzan Eliminating Random Permutation Oracles in the Even-Mansour Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Partha Dutta, Rachid Guerraoui, Ron R. Levy, Arindam Chakraborty How fast can a distributed atomic read be? Search on Bibsonomy PODC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF time-complexity, atomic registers, shared-memory emulation
16Thomas Erlebach, Riko Jacob, Matús Mihalák, Marc Nunkesser, Gábor Szabó 0001, Peter Widmayer Joint Base Station Scheduling. Search on Bibsonomy WAOA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Kai Man Tsui, Shing-Chow Chan, K. W. Tse 0001 Error analysis and complexity optimization for the multiplier-less FFT-like transformation (ML-FFT). Search on Bibsonomy ISCAS (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Finbarr O'Loughlin, Desmond Chambers The Measurement of an Optimum Load Balancing Algorithm in a Master/Slave Architecture. Search on Bibsonomy ICCSA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Woosin Lee, Hyukjoon Lee, Seung Hyong Rhee, Hyungkeun Lee An Efficient Scheduling Scheme for Bluetooth Scatternets Using the Sniff Mode. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Lars R. Knudsen, John Erik Mathiassen On the Role of Key Schedules in Attacks on Iterated Ciphers. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Hiroshi Yokota, Shigetomo Kimura, Yoshihiko Ebihara A Proposal of DNS-Based Adaptive Load Balancing Method for Mirror Server Systems and Its Implementation. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Vahab S. Mirrokni, Adrian Vetta Convergence Issues in Competitive Games. Search on Bibsonomy APPROX-RANDOM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Eli Biham, Rafi Chen Near-Collisions of SHA-0. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Ludger Hemme A Differential Fault Attack Against Early Rounds of (Triple-)DES. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Hüseyin Özgür Tan, Ibrahim Korpeoglu Power efficient data gathering and aggregation in wireless sensor networks. Search on Bibsonomy SIGMOD Rec. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer A Preemptive Deterministic Scheduling Algorithm for Multithreaded Replicas. Search on Bibsonomy DSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Dekel Tsur Sequencing by Hybridization in Few Rounds. Search on Bibsonomy ESA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Rahul Jain 0001, Jaikumar Radhakrishnan, Pranab Sen A Direct Sum Theorem in Communication Complexity via Message Compression. Search on Bibsonomy ICALP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Jing Liu, Mounir Hamdi, Qingsheng Hu Stable and Practical Scheduling Algorithms for High Speed Virtual Output Queuing Switches. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Eli Biham, Orr Dunkelman, Nathan Keller Differential-Linear Cryptanalysis of Serpent. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Ronald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz Efficient Multi-party Computation over Rings. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Motohiko Matsuda, Tomohiro Kudoh, Yutaka Ishikawa Evaluation of MPI Implementations on Grid-connected Clusters using an Emulated WAN Environmen. Search on Bibsonomy CCGRID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Jonathan Katz, Moti Yung Scalable Protocols for Authenticated Group Key Exchange. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Carole Delporte-Gallet, Hugues Fauconnier, Rachid Guerraoui, Bastian Pochon Distributed Programming for Dummies: A Shifting Transformation Technique. Search on Bibsonomy SRDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Stephanie Lindsey, Cauligi S. Raghavendra, Krishna M. Sivalingam Data Gathering Algorithms in Sensor Networks Using Energy Metrics. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF data gathering protocols, Wireless sensor networks, performance evaluation, greedy algorithms, energy-efficient operation
16Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson New Results on Unconditionally Secure Distributed Oblivious Transfer. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Eli Biham, Orr Dunkelman, Nathan Keller Enhancing Differential-Linear Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano Randomness-Optimal Characterization of Two NP Proof Systems. Search on Bibsonomy RANDOM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Yongjin Yeom, Sangwoo Park, Iljun Kim On the Security of CAMELLIA against the Square Attack. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Anne Canteaut, Marion Videau Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF higher order differential cryptanalysis, Boolean functions, Block ciphers, nonlinearity
16Selçuk Kavut, Melek D. Yücel Slide Attack on Spectr-H64. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Avalanche Weight Distribution (AWD), Slide attack, Spectr-H64
16Michael Elkin, Guy Kortsarz Combinatorial logarithmic approximation algorithm for directed telephone broadcast problem. Search on Bibsonomy STOC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Nikolay N. Elkin Numerical Solution of Large Non-Hermitian Eigenvalue Problem Arising from Model of Vertical Cavity Surface Emitting Laser Array. Search on Bibsonomy Numerical Methods and Application The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Hongjun Wu Related-Cipher Attacks. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Sanjay Shakkottai, Anurag Kumar 0001, Aditya Karnik, Ajit Anvekar TCP performance over end-to-end rate control and stochastic available capacity. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF TCP over ABR, Congestion control, TCP/IP, TCP performance
16Victor Y. Pan, Yanqiang Yu Certification of Numerical Computation of the Sign of the Determinant of a Matrix. Search on Bibsonomy Algorithmica The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Rida A. Bazzi, Gil Neiger Simplifying fault-tolerance: providing the abstraction of crash failures. Search on Bibsonomy J. ACM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF fault-tolerance, translations, crash failures
16Wook-Shin Han, Yang-Sae Moon, Kyu-Young Whang, Il-Yeol Song Prefetching Based on Type-Level Access Pattern in Object-Relational DBMSs. Search on Bibsonomy ICDE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Chuanxiong Guo SRR: An O(1) time complexity packet scheduler for flows in multi-service packet networks. Search on Bibsonomy SIGCOMM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF QoS, Internet, complexity, packet scheduler, high speed networks, end-to-end delay, fair queueing
16Javier D. Bruguera, Tomás Lang Using the Reverse-Carry Approach for Double Datapath Floating-Point Addition. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Ju-Sung Kang, Sang-Uk Shin, Dowon Hong, Okyeon Yi Provable Security of KASUMI and 3GPP Encryption Mode f8. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Phong Q. Nguyen, Igor E. Shparlinski On the Insecurity of a Server-Aided RSA Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Server-aided protocol, Cryptanalysis, Lattices, RSA signature
16Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee 0002, Jongin Lim 0001 Impossible Differential Cryptanalysis of Zodiac. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen Differential Cryptanalysis of Q. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Daniele Frigioni, Giuseppe F. Italiano Dynamically Switching Vertices in Planar Graphs. Search on Bibsonomy Algorithmica The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Sign of matrix determinant, Arithmetic filters, Certified geometric computations, Distance to a singular matrix, Convex hull
16Rosario Gennaro A Protocol to Achieve Independence in Constant Rounds. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF simultaneous broadcast and Verifiable Secret Sharing (VSS) protocols, computation model, communication networks, Independence
16Fabíola Greve, Michel Hurfin, Raimundo A. Macêdo, Michel Raynal Consensus Based on Strong Failure Detectors: A Time and Message-Efficient Protocol. Search on Bibsonomy IPDPS Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Perpetual Accuracy Property, Consensus, Asynchronous Distributed Systems, Crash Failure, Unreliable Failure Detector
16Amr M. Youssef, Guang Gong On the Interpolation Attacks on Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF interpolation attack, Galois Field Fourier Transform, cryptanalysis, Block cipher, finite fields
16Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David A. Wagner 0001, Doug Whiting Improved Cryptanalysis of Rijndael. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Marine Minier, Henri Gilbert Stochastic Cryptanalysis of Crypton. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Divyesh Jadav, Alok N. Choudhary, P. Bruce Berra Techniques for Increasing the Stream Capacity of A High-Performance Multimedia Server. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Parallel input/output, media-on-demand server, real-time data retrieval, dynamic resource allocation, file replication
16Hidema Tanaka, Kazuyuki Hisamatsu, Toshinobu Kaneko Strenght of MISTY1 without FL Function for Higher Order Differential Attack. Search on Bibsonomy AAECC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko Interpolation Attacks of the Block Cipher: SNAKE. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Mitsuru Matsui, Toshio Tokita Cryptanalysis of a Reduced Version of the Block Cipher E2. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Philip Hawkes, Luke O'Connor XOR and Non-XOR Differential Probabilities. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Miki Haseyama, Hideo Kitajima A filter-coefficient quantization method with genetic algorithm. Search on Bibsonomy ISCAS (3) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Lars R. Knudsen Advanced Encryption Standard (AES) - An Update. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Davor Runje, Mario Kovac Universal Strong Encryption FPGA Core Implementation. Search on Bibsonomy DATE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Chip Architecture, FPGA, Encryption, IDEA
16Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko Higher Order Differential Attak of CAST Cipher. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Sivarama P. Dandamudi The Effect of Scheduling Discipline on Dynamic Load Sharing in Heterogeneous Distributed Systems. Search on Bibsonomy MASCOTS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Rolf Walter The Asynchronous Stack Revisited: Rounds Sets the Twilight Reeling. Search on Bibsonomy Foundations of Computer Science: Potential - Theory - Cognition The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Kazumaro Aoki, Kunio Kobayashi, Shiho Moriai Best Differential Characteristic Search of FEAL. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Carlo Harpes, James L. Massey Partitioning Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Vikraman Arvind, Jacobo Torán A Nonadaptive NC Checker for Permutation Group Intersection. Search on Bibsonomy CCC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF nonadaptive queries, permutation groups, Program checking
Displaying result #501 - #600 of 6665 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license