Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Clé recherche")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 131

  • Page / 6
Export

Selection :

  • and

Distinguishing attacks on SOBER-t16 and t32EKDAHL, Patrik; JOHANSSON, Thomas.Lecture notes in computer science. 2002, pp 210-224, issn 0302-9743, isbn 3-540-44009-7, 15 p.Conference Paper

Some average performance measures for the B-treeWRIGHT, W. E.Acta informatica. 1985, Vol 21, Num 6, pp 541-557, issn 0001-5903Article

On optimal arrangement of keys with double hashingYAO, A. C.Journal of algorithms (Print). 1985, Vol 6, Num 2, pp 253-264, issn 0196-6774Article

Interpolation-binary searchSANTORO, N; SIDNEY, J. B.Information processing letters. 1985, Vol 20, Num 4, pp 179-181, issn 0020-0190Article

Universal retrieval treesKRICHEVSKY, R. E; RYABKO, B. YA.Discrete applied mathematics. 1985, Vol 12, Num 3, pp 291-302, issn 0166-218XArticle

Public-key cryptosystem and digital-signature schemes based on linear algebra over a local ringZU-HUA, S.IEE proceedings. Part E. Computers and digital techniques. 1987, Vol 134, Num 5, pp 254-256, issn 0143-7062Article

Partial match retrieval in implicit data structuresALT, H; MEHLHORN, K; MUNRO, J. I et al.Information processing letters. 1984, Vol 19, Num 2, pp 61-65, issn 0020-0190Article

Optimal multiway search trees for variable size keysSZWARCFITER, J. L.Acta informatica. 1984, Vol 21, Num 1, pp 47-60, issn 0001-5903Article

Partitioned encryption and achieving simultaneity by partitioningGALIL, Z; YUNG, M.Information processing letters. 1987, Vol 26, Num 2, pp 81-88, issn 0020-0190Article

An optimal algorithm for assigning cryptographic keys to control access in a hierarchyMACKINNON, S. J; TAYLOR, P. D; MEIJER, H et al.IEEE transactions on computers. 1985, Vol 34, Num 9, pp 797-802, issn 0018-9340Article

Cryptanalysis of SOBER-t32BABBAGE, Steve; DE CANNIERE, Christophe; LANO, Joseph et al.Lecture notes in computer science. 2003, pp 111-128, issn 0302-9743, isbn 3-540-20449-0, 18 p.Conference Paper

Rank order distributions and secondary key indexingSAMSON, W. B; BENDELL, A.Computer journal (Print). 1985, Vol 28, Num 3, pp 309-312, issn 0010-4620Article

Algorithme de décomposition de clés = Key decomposition algorithmPICHAT, E.R.A.I.R.O. Informatique théorique. 1985, Vol 19, Num 3, pp 213-232, issn 0399-0540Article

Optimal information retrieval when queries are not randomCHANG, C. C.Information sciences. 1984, Vol 34, Num 3, pp 199-223, issn 0020-0255Article

Multidimensional search trees that provide new types of memory reductionsWILLARD, D. E.Journal of the Association for Computing Machinery. 1987, Vol 34, Num 4, pp 846-858, issn 0004-5411Article

On the number of keys in minimal 2-3 brother treesSASTRY, V. U. K; MURTHY, T. N. V.International journal of computer mathematics. 1986, Vol 19, Num 3-4, pp 267-269, issn 0020-7160Article

Design and analysis of password-based key derivation functionsYAO, Frances F; YIQUN LISA YIN.Lecture notes in computer science. 2005, pp 245-261, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper

Searching for the stego-keyFRIDRICH, Jessica; GOLJAN, Miroslav; SOUKAL, David et al.SPIE proceedings series. 2004, pp 70-82, isbn 0-8194-5209-2, 13 p.Conference Paper

Duplicate entries versus see cross-references in back-of-book indexesDIODATO, V.Indexer. 1994, Vol 19, Num 2, pp 83-87, issn 0019-4131Article

Library cataloguing: relevance to modern library usersTIRONG ARAP TANUI.Library review (Glasgow). 1992, Vol 41, Num 3, pp 33-38, issn 0024-2535Article

A generalized, one-way, stackless quicksortWEGNER, L. M.BIT (Nordisk Tidskrift for Informationsbehandling). 1987, Vol 27, Num 1, pp 44-48, issn 0006-3835Article

A D0L-T0L public key cryptosystemSUBRAMANIAN, K. G; RANI SIROMONEY; JEYANTHI ABISHA, P et al.Information processing letters. 1987, Vol 26, Num 2, pp 95-97, issn 0020-0190Article

Conway's parallel sorting algorithmWARSHAUER, M. L.Journal of algorithms (Print). 1986, Vol 7, Num 2, pp 270-276, issn 0196-6774Article

On the success probability of X2-attack on RC6MIAJI, Atsuko; TAKANO, Yuuki.Lecture notes in computer science. 2005, pp 61-74, issn 0302-9743, isbn 3-540-26547-3, 14 p.Conference Paper

A comparison of USMARC and UNIMARC for system designMCKERCHER, B; XIN CHANG, P.International cataloguing and bibliographic control. 1995, Vol 24, Num 2, pp 21-25, issn 1011-8829Article

  • Page / 6