Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("11T71")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 241

  • Page / 10
Export

Selection :

  • and

Extended visual cryptography schemesKLEIN, Andreas; WESSLER, Markus.Information and computation (Print). 2007, Vol 205, Num 5, pp 716-732, issn 0890-5401, 17 p.Article

ON ACHIEVING THE BEST OF BOTH WORLDS IN SECURE MULTIPARTY COMPUTATIONISHAI, Yuval; KATZ, Jonathan; KUSHILEVITZ, Eyal et al.SIAM journal on computing (Print). 2011, Vol 40, Num 1, pp 122-141, issn 0097-5397, 20 p.Article

On the Exact Evaluation of Certain Instances of the Potts Partition Function by Quantum ComputersGERACI, Joseph; LIDAR, Daniel A.Communications in mathematical physics. 2008, Vol 279, Num 3, pp 735-768, issn 0010-3616, 34 p.Article

COMPRESSION IN FINITE FIELDS AND TORUS-BASED CRYPTOGRAPHYRUBIN, K; SILVERBERG, A.SIAM journal on computing (Print). 2008, Vol 37, Num 5, pp 1401-1428, issn 0097-5397, 28 p.Article

New quinary linear codes from quasi-twisted codes and their dualsACKERMAN, Ryan; AYDIN, Nuh.Applied mathematics letters. 2011, Vol 24, Num 4, pp 512-515, issn 0893-9659, 4 p.Article

Improvement of digital signature with message recovery using self-certified public keys and its variantsZUHUA SHAO.Applied mathematics and computation. 2004, Vol 159, Num 2, pp 391-399, issn 0096-3003, 9 p.Article

Generalized Hermitian codesMUNUERA, C; SEPULVEDA, A; TORRES, F et al.Designs, codes and cryptography. 2013, Vol 69, Num 1, pp 123-130, issn 0925-1022, 8 p.Article

Lewis Carroll's ciphers: The literary connectionsABELES, Francine F.Advances in applied mathematics (Print). 2005, Vol 34, Num 4, pp 697-708, issn 0196-8858, 12 p.Article

Convertible undeniable signature with subliminal channelsLEE, Narn-Yih; HO, Pei-Hsiu.Applied mathematics and computation. 2004, Vol 158, Num 1, pp 169-175, issn 0096-3003, 7 p.Article

Multi-party authenticated key agreement protocols from multi-linear formsLEE, Young-Ran; LEE, Hyang-Sook; LEE, Ho-Kyu et al.Applied mathematics and computation. 2004, Vol 159, Num 2, pp 317-331, issn 0096-3003, 15 p.Article

Bounds on the efficiency of black-box commitment schemesHORVITZ, Omer; KATZ, Jonathan.Theoretical computer science. 2010, Vol 411, Num 10, pp 1251-1260, issn 0304-3975, 10 p.Conference Paper

Post-quantum cryptography: lattice signaturesBUCHMANN, Johannes; LINDNER, Richard; RÜCKERT, Markus et al.Computing (Wien. Print). 2009, Vol 85, Num 1-2, pp 105-125, issn 0010-485X, 21 p.Article

Further improvement on the modified authenticated key agreement schemeLEE, Narn-Yih; LEE, Ming-Feng.Applied mathematics and computation. 2004, Vol 157, Num 3, pp 729-733, issn 0096-3003, 5 p.Article

Cryptanalysis of Lee-Lee authenticated key agreement schemeKIM, Kee-Won; RYU, Eun-Kyung; YOO, Kee-Young et al.Applied mathematics and computation. 2005, Vol 163, Num 1, pp 193-198, issn 0096-3003, 6 p.Article

Improvement of signature scheme based on factoring and discrete logarithmsLI, Li-Hua; TZENG, Shiang-Feng; HWANG, Min-Shiang et al.Applied mathematics and computation. 2005, Vol 161, Num 1, pp 49-54, issn 0096-3003, 6 p.Article

Cryptanalysis of Tseng et al.'s authenticated encryption schemesQI XIE; XIU YUAN YU.Applied mathematics and computation. 2004, Vol 158, Num 1, pp 1-5, issn 0096-3003, 5 p.Article

Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroupsLEYOU ZHANG; YUPU HU; QING WU et al.Mathematical and computer modelling. 2012, Vol 55, Num 1-2, pp 12-18, issn 0895-7177, 7 p.Article

An ID-based multi-signer universal designated multi-verifier signature schemeCHANG, Ting-Yi.Information and computation (Print). 2011, Vol 209, Num 7, pp 1007-1015, issn 0890-5401, 9 p.Article

A metric on the set of elliptic curves over FpPRADEEP KUMAR MISHRA; KISHAN CHAND GUPTA.Applied mathematics letters. 2008, Vol 21, Num 12, pp 1330-1332, issn 0893-9659, 3 p.Article

Pairings for CryptographersGALBRAITH, Steven D; PATERSON, Kenneth G; SMART, Nigel P et al.Discrete applied mathematics. 2008, Vol 156, Num 16, pp 3113-3121, issn 0166-218X, 9 p.Article

PD-sets for binary RM-codes and the codes related to the Klein quadric and to the Schubert variety of PG(5,2)KROLL, Hans-Joachim; VINCENTI, Rita.Discrete mathematics. 2008, Vol 308, Num 2-3, pp 408-414, issn 0012-365X, 7 p.Conference Paper

A rational approach to cryptographic protocolsCABALLERO-GIL, P; HENANDEZ-GOYA, C; BRUNO-CASTANEDA, C et al.Mathematical and computer modelling. 2007, Vol 46, Num 1-2, pp 80-87, issn 0895-7177, 8 p.Conference Paper

Minimal blocks of binary even-weight vectorsKUNG, Joseph P. S.Linear algebra and its applications. 2006, Vol 416, Num 2-3, pp 288-297, issn 0024-3795, 10 p.Article

A novel proxy deposit protocol for e-cash systemsCHEN, Yu-Yi; JAN, Jinn-Ke; CHEN, Chin-Ling et al.Applied mathematics and computation. 2005, Vol 163, Num 2, pp 869-877, issn 0096-3003, 9 p.Article

Certificateless cryptography with KGC trust level 3GUOMIN YANG; CHIK HOW TAN.Theoretical computer science. 2011, Vol 412, Num 39, pp 5446-5457, issn 0304-3975, 12 p.Article

  • Page / 10