Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("CRYPTOGRAPHY")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 7539

  • Page / 302
Export

Selection :

  • and

AN IMPROVED ALGORITHM FOR COMPUTING LOGARITHMS OVER GF(P) AND ITS CRYPTOGRAPHIC SIGNIFICANCEPOHLIG SC; HELLMAN ME.1978; I.E.E.E. TRANS. INFORM. THEORY; USA; DA. 1978; VOL. 24; NO 1; PP. 106-110; BIBL. 15 REF.Article

FAST DECIPHERMENT ALGORITHM FOR RSA PUBLIC-KEY CRYPTOSYSTEMQUISQUATER JJ; COUVREUR C.1982; ELECTRONICS LETTERS; ISSN 0013-5194; GBR; DA. 1982; VOL. 18; NO 21; PP. 905-907; BIBL. 13 REF.Article

ON SECRET SHARING SYSTEMSKARNIN ED; GREENE JW; HELLMAN ME et al.1983; IEEE TRANSACTIONS ON INFORMATION THEORY; ISSN 0018-9448; USA; DA. 1983; VOL. 29; NO 1; PP. 35-41; BIBL. 8 REF.Article

IMPLEMENTATION OF DIGITAL SIGNATURESARAZI B.1982; ELECTRONICS LETTERS; ISSN 0013-5194; GBR; DA. 1982; VOL. 18; NO 21; PP. 900-901; BIBL. 2 REF.Article

AN ADDRESSABLE SATELLITE ENCRYPTON SYSTEM FOR PREVENTING SIGNAL PIRACYHANAS OJ; DEN TOONDER P; PENNYPACKER F et al.1981; IEEE TRANS. CONSUM. ELECTRON.; ISSN 0098-3063; USA; DA. 1981; VOL. 27; NO 4; PP. 631-636Article

CRYPTOGRAPHY-MODERN CIPHER SYSTEMSBEKER H.1980; NEW ELECTRON.; ISSN 0047-9624; GBR; DA. 1980; VOL. 13; NO 24; PP. 29-33; 3 P.Article

EXTENSION OF RSA CRYPTO-STRUCTURE: A GALOIS APPROACH. REPLYDELSARTE P; PIRET P; KRAVITZ DW et al.1982; ELECTRONICS LETTERS; ISSN 0013-5194; GBR; DA. 1982; VOL. 18; NO 3; PP. 582-583; BIBL. 4 REF.Article

SOME TECHNIQUES FOR HANDLING ENCIPHERMENT KEYSJONES RW.1982; ICL TECHNICAL JOURNAL; ISSN 0142-1557; GBR; DA. 1982; VOL. 3; NO 2; PP. 175-188; BIBL. 8 REF.Article

KRYPTOGRAPHIE ALS INSTRUMENT DES DATENSCHUTZES = CRYPTOGRAPHIE COMME MOYEN DE PROTECTION DE DONNEESBETH T.1982; INFORM.-SPEKTRUM; ISSN 0170-6012; DEU; DA. 1982; VOL. 5; NO 2; PP. 82-96; ABS. ENG; BIBL. 53 REF.Article

THE DISTANCE FACTOR IN CRYPTOSYSTEMSVOUKALIS DC.1980; INT. J. ELECTRON. EXP.; ISSN 0020-7217; GBR; DA. 1980; VOL. 49; NO 1; PP. 73-75; BIBL. 2 REF.Article

ERROR PROBABILITIES FOR SIMPLE SUBSTITUTION CIPHERSSGARRO A.1983; IEEE TRANSACTIONS ON INFORMATION THEORY; ISSN 0018-9448; USA; DA. 1983; VOL. 30; NO 2; PP. 190-198; BIBL. 10 REF.Article

EXTENSION OF RSA CRYPTO-STRUCTURE: A GALOIS APPROACHKRAVITZ DW; REED IS.1982; ELECTRONICS LETTERS; ISSN 0013-5194; GBR; DA. 1982; VOL. 18; NO 6; PP. 255-256; BIBL. 2 REF.Article

KRYPTOLOGIE - VERFAHREN UND MAXIMEN = CRYPTOLOGIE - PROCEDES ET MAXIMESBAUER FL.1982; INFORM.-SPEKTRUM; ISSN 0170-6012; DEU; DA. 1982; VOL. 5; NO 2; PP. 74-81; ABS. ENG; BIBL. 9 REF.Article

PROTEZIONE DELLA PROPRIETA DEL SOFTWARE MEDIANTE TECHNICHE CRITTOGRAFICHE = PROTECTION DE LA PROPRIETE DU LOGICIEL AU MOYEN DE TECHNIQUES CRYPTOGRAPHIQUESANTOY S.1981; RIV. INFORM.; ISSN 0390-668X; ITA; DA. 1981; VOL. 11; NO 4; PP. 411-417; BIBL. 16 REF.Article

CRITICAL REMARKS ON SOME PUBLIC-KEY CRYPTOSYSTEMSHERLESTAM T.1978; B.I.T.; DNK; DA. 1978; VOL. 18; NO 4; PP. 493-496; BIBL. 9 REF.Article

High-fidelity entangled-photon link for Quantum Key Distribution testbedDI GIUSEPPE, Giovanni; SERGIENKO, Alexander V; SALEH, Bahaa E. A et al.SPIE proceedings series. 2003, pp 39-50, isbn 0-8194-4965-2, 12 p.Conference Paper

Quantum Computation and Quantum CryptographyMOSCA, Michele; TAPP, Alain.Algorithmica. 2002, Vol 34, Num 4, pp 309-559, issn 0178-4617Serial Issue

Probability to meet in the middleNISHIMURA, K; SIBUYA, M.Journal of cryptology. 1990, Vol 2, Num 1, pp 13-22, issn 0933-2790, 10 p.Article

CRYPTOGRAPHY. PROCEEDINGS OF THE WORKSHOP ON CRYPTOGRAPHY BURG FEUERSTEIN, GERMANY, MARCH 29-APRIL 2, 1982BETH T ED.1983; LECTURE NOTES IN COMPUTER SCIENCE; ISSN 0302-9743; DEU; DA. 1983; VOL. 149; VIII-402 P.; BIBL. DISSEM.Conference Paper

COMMUNICATIONS SECURITY: A SURVEY OF CRYPTOGRAPHYBEKER HJ; PIPER FC.1982; IEE PROCEEDINGS. PART A. PHYSICAL SCIENCE, MEASUREMENT AND INSTRUMENTATION, MANAGEMENT AND EDUCATION REVIEWS; ISSN 0143-702X; GBR; DA. 1982; VOL. 129; NO 6; PART. A; PP. 357-376; BIBL. 105 REF.Article

UNIVERSAL TEST SETS FOR THE STANDARD ENCRYPTION ALGORITHM = ENSEMBLES DE TESTS UNIVERSELS POUR L'ALGORITHME DE CRYPTOGRAPHIE STANDARDGAIT J.1982; IEEE TRANS. RELIAB.; ISSN 0018-9529; USA; DA. 1982; VOL. 31; NO 1; PP. 5-8; BIBL. 5 REF.Article

DATA SECURITYBRYCE HD.1981; IEEE TRANS. CONSUM. ELECTRON.; ISSN 0098-3063; USA; DA. 1981; VOL. 27; NO 2; PP. 159-165Article

NEW HASH FUNCTIONS AND THEIR USE IN AUTHENTICATION AND SET EQUALITYWEGMAN MN; CARTER JL.1981; J. COMPUT. SYST. SCI.; ISSN 0022-0000; USA; DA. 1981; VOL. 22; NO 3; PP. 265-279; BIBL. 14 REF.Article

CRYPTOGRAPHIC REQUIREMENTS FOR DIGITAL SECURE SPEECH SYSTEMSBEKER HJ.1980; ELECTRON. ENJ.; ISSN 0013-4902; GBR; DA. 1980; VOL. 52; NO 634; PP. 37-46; (5 P.)Article

RECENT TRENDS IN CRYPTOLOGYGORDON JA.1980; ELECTRON. AND POWER; GBR; DA. 1980; VOL. 26; NO 2; PP. 162-165; BIBL. 10 REF.Article

  • Page / 302