Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("CRYPTOGRAPHIE")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 7539

  • Page / 302
Export

Selection :

  • and

FAST DECIPHERMENT ALGORITHM FOR RSA PUBLIC-KEY CRYPTOSYSTEMQUISQUATER JJ; COUVREUR C.1982; ELECTRONICS LETTERS; ISSN 0013-5194; GBR; DA. 1982; VOL. 18; NO 21; PP. 905-907; BIBL. 13 REF.Article

AN IMPROVED ALGORITHM FOR COMPUTING LOGARITHMS OVER GF(P) AND ITS CRYPTOGRAPHIC SIGNIFICANCEPOHLIG SC; HELLMAN ME.1978; I.E.E.E. TRANS. INFORM. THEORY; USA; DA. 1978; VOL. 24; NO 1; PP. 106-110; BIBL. 15 REF.Article

GENERATORS FOR CERTAIN ALTERNATING GROUPS WITH APPLICATIONS TO CRYPTOGRAPHY.COPPERSMITH D; GROSSMAN E.1975; S.I.A.M. J. APPL. MATH.; U.S.A.; DA. 1975; VOL. 29; NO 4; PP. 624-627; BIBL. 3 REF.Article

HOW TO PROTECT DATA WITH CIPHERS THAT ARE REALLY HARD TO BREAKGEFFE PR.1973; ELECTRONICS; U.S.A.; DA. 1973; VOL. 46; NO 1; PP. 99-101; BIBL. 6 REF.Serial Issue

ON SECRET SHARING SYSTEMSKARNIN ED; GREENE JW; HELLMAN ME et al.1983; IEEE TRANSACTIONS ON INFORMATION THEORY; ISSN 0018-9448; USA; DA. 1983; VOL. 29; NO 1; PP. 35-41; BIBL. 8 REF.Article

THE CHALLENGE OF CRYPTOGRAPHY.ALLEN AD.1976; I.E.E.E. TRANS. SYST. MAN CYBERN.; U.S.A.; DA. 1976; VOL. 6; NO 1; PP. 64-65; BIBL. 1 REF.Article

IMPLEMENTATION OF DIGITAL SIGNATURESARAZI B.1982; ELECTRONICS LETTERS; ISSN 0013-5194; GBR; DA. 1982; VOL. 18; NO 21; PP. 900-901; BIBL. 2 REF.Article

AN ADDRESSABLE SATELLITE ENCRYPTON SYSTEM FOR PREVENTING SIGNAL PIRACYHANAS OJ; DEN TOONDER P; PENNYPACKER F et al.1981; IEEE TRANS. CONSUM. ELECTRON.; ISSN 0098-3063; USA; DA. 1981; VOL. 27; NO 4; PP. 631-636Article

CRYPTOGRAPHY-MODERN CIPHER SYSTEMSBEKER H.1980; NEW ELECTRON.; ISSN 0047-9624; GBR; DA. 1980; VOL. 13; NO 24; PP. 29-33; 3 P.Article

EXTENSION OF RSA CRYPTO-STRUCTURE: A GALOIS APPROACH. REPLYDELSARTE P; PIRET P; KRAVITZ DW et al.1982; ELECTRONICS LETTERS; ISSN 0013-5194; GBR; DA. 1982; VOL. 18; NO 3; PP. 582-583; BIBL. 4 REF.Article

SOME TECHNIQUES FOR HANDLING ENCIPHERMENT KEYSJONES RW.1982; ICL TECHNICAL JOURNAL; ISSN 0142-1557; GBR; DA. 1982; VOL. 3; NO 2; PP. 175-188; BIBL. 8 REF.Article

KRYPTOGRAPHIE ALS INSTRUMENT DES DATENSCHUTZES = CRYPTOGRAPHIE COMME MOYEN DE PROTECTION DE DONNEESBETH T.1982; INFORM.-SPEKTRUM; ISSN 0170-6012; DEU; DA. 1982; VOL. 5; NO 2; PP. 82-96; ABS. ENG; BIBL. 53 REF.Article

THE DISTANCE FACTOR IN CRYPTOSYSTEMSVOUKALIS DC.1980; INT. J. ELECTRON. EXP.; ISSN 0020-7217; GBR; DA. 1980; VOL. 49; NO 1; PP. 73-75; BIBL. 2 REF.Article

ERROR PROBABILITIES FOR SIMPLE SUBSTITUTION CIPHERSSGARRO A.1983; IEEE TRANSACTIONS ON INFORMATION THEORY; ISSN 0018-9448; USA; DA. 1983; VOL. 30; NO 2; PP. 190-198; BIBL. 10 REF.Article

EXTENSION OF RSA CRYPTO-STRUCTURE: A GALOIS APPROACHKRAVITZ DW; REED IS.1982; ELECTRONICS LETTERS; ISSN 0013-5194; GBR; DA. 1982; VOL. 18; NO 6; PP. 255-256; BIBL. 2 REF.Article

KRYPTOLOGIE - VERFAHREN UND MAXIMEN = CRYPTOLOGIE - PROCEDES ET MAXIMESBAUER FL.1982; INFORM.-SPEKTRUM; ISSN 0170-6012; DEU; DA. 1982; VOL. 5; NO 2; PP. 74-81; ABS. ENG; BIBL. 9 REF.Article

PROTEZIONE DELLA PROPRIETA DEL SOFTWARE MEDIANTE TECHNICHE CRITTOGRAFICHE = PROTECTION DE LA PROPRIETE DU LOGICIEL AU MOYEN DE TECHNIQUES CRYPTOGRAPHIQUESANTOY S.1981; RIV. INFORM.; ISSN 0390-668X; ITA; DA. 1981; VOL. 11; NO 4; PP. 411-417; BIBL. 16 REF.Article

CRITICAL REMARKS ON SOME PUBLIC-KEY CRYPTOSYSTEMSHERLESTAM T.1978; B.I.T.; DNK; DA. 1978; VOL. 18; NO 4; PP. 493-496; BIBL. 9 REF.Article

High-fidelity entangled-photon link for Quantum Key Distribution testbedDI GIUSEPPE, Giovanni; SERGIENKO, Alexander V; SALEH, Bahaa E. A et al.SPIE proceedings series. 2003, pp 39-50, isbn 0-8194-4965-2, 12 p.Conference Paper

Quantum Computation and Quantum CryptographyMOSCA, Michele; TAPP, Alain.Algorithmica. 2002, Vol 34, Num 4, pp 309-559, issn 0178-4617Serial Issue

Probability to meet in the middleNISHIMURA, K; SIBUYA, M.Journal of cryptology. 1990, Vol 2, Num 1, pp 13-22, issn 0933-2790, 10 p.Article

EXPERIMENTS WITH RELAXATION ALGORITHMS FOR BREAKING SIMPLE SUBTITUTION CIPHERSHUNTER DGN; MCKENZIE AR.1983; COMPUTER JOURNAL; ISSN 0010-4620; GBR; DA. 1983; VOL. 26; NO 1; PP. 68-71; BIBL. 4 REF.Article

COMPUTER SCIENCE AND TECHNOLOGY: VALIDATING THE CORRECTNESS OF HARDWARE IMPLEMENTATIONS OF THE NBS DATA ENCRYPTION STANDARDGAIT J.1980; SPEC. PUBL.-NATL. BUR. STAND.; ISSN 0083-1883; USA; DA. 1980; 500-20; PP. 1-40; BIBL. 8 REF.Serial Issue

SECURITY AND ENCRYPTION HARDWAREMAGGAHAN A.1980; COMMUNICATION NETWORKS 80. CONFERENCE AND EXPOSITION/1980/WASHINGTON DC; USA; NEWTON MA: IITI; DA. 1980; PP. 272-275Conference Paper

AROUND THE IC LOOP1980; COMPUTER DESIGN; USA; DA. 1980; VOL. 19; NO 6; PP. 158-180; (11 P.)Article

  • Page / 302