Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Décryptage")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 441

  • Page / 18
Export

Selection :

  • and

LIRE LE GRAND LIVRE DE LA VIE : Le décryptage du génome humain dans la presse française : Les natures de l'homme = Deciphering the Great Book of LifeDE CHEVEIGNE, Suzanne.Techniques & culture (Paris). 2008, Num 50, pp 206-225, issn 0248-6016, 20 p.Article

Decryption-Decompression of AES Protected ZIP Files on GPUsNHAT DUONG, Tan; HONG PHAM, Phong; HUU NGUYEN, Due et al.Proceedings of SPIE, the International Society for Optical Engineering. 2011, Vol 8285, issn 0277-786X, isbn 978-0-8194-8932-6, 828568.1-828568.8, 3Conference Paper

A new public key cryptosystem for constrained hardwareZHENG, Jiande.Lecture notes in computer science. 2002, pp 334-341, issn 0302-9743, isbn 3-540-44270-7, 8 p.Conference Paper

Amplified boomerang attacks against reduced-round MARS and SerpentKELSEY, John; KOHNO, Tadayoshi; SCHNEIER, Bruce et al.Lecture notes in computer science. 2001, pp 75-93, issn 0302-9743, isbn 3-540-41728-1Conference Paper

Non-malleable encryption : Equivalence between two notions, and an indistinguishability-based characterizationBELLARE, M; SAHAI, A.Lecture notes in computer science. 1999, pp 519-536, issn 0302-9743, isbn 3-540-66347-9Conference Paper

Enigma: CRUISE Missiles, Rockets & SupergunsJUDKINS, Phil.Links (London). 2013, Num 228, issn 1478-484X, p. 19Article

A new generalized group-oriented cryptoscheme without trusted centersCHIN-CHEN CHANG; HORNG-CHIN LEE.IEEE journal on selected areas in communications. 1993, Vol 11, Num 5, pp 725-729, issn 0733-8716Article

Efficient, verifiable shuffle decryption and its requirement of unlinkabilityJUN FURUKAWA.Lecture notes in computer science. 2004, pp 319-332, issn 0302-9743, isbn 3-540-21018-0, 14 p.Conference Paper

A key recovery mechanism for reliable group key managementCHO, Taenam; LEE, Sang-Ho.Lecture notes in computer science. 2003, pp 372-386, issn 0302-9743, isbn 3-540-20208-0, 15 p.Conference Paper

Fast RSA-type cryptosystem modulo pkqTAKAGI, T.Lecture notes in computer science. 1998, pp 318-326, issn 0302-9743, isbn 3-540-64892-5Conference Paper

Encryption of analog signals. A perspectiveGERSHO, A; STEELE, R.IEEE journal on selected areas in communications. 1984, Vol 2, Num 3, pp 423-425, issn 0733-8716Article

Les secrets de César et du téléphone rougeLEHNING, Hervé.Recherche (Paris, 1970). 2005, Num 392, pp 80-81, issn 0029-5671, 2 p.Article

A key encapsulation mechanism for NTRUSTAM, Martijn.Lecture notes in computer science. 2005, pp 410-427, issn 0302-9743, isbn 3-540-30276-X, 1Vol, 18 p.Conference Paper

Practical key recovery schemesYEN, Sung-Ming.Lecture notes in computer science. 2001, pp 104-114, issn 0302-9743, isbn 3-540-42300-1Conference Paper

A chosen-plaintext linear attack on DESKNUDSEN, Lars R; MATHIASSEN, John Erik.Lecture notes in computer science. 2001, pp 262-272, issn 0302-9743, isbn 3-540-41728-1Conference Paper

Open issues in formal methods for cryptographic protocol analysisMEADOWS, Catherine.Lecture notes in computer science. 2001, issn 0302-9743, isbn 3-540-42103-3, p. 21Conference Paper

Long-lived broadcast encryptionGARAY, J. A; STADDON, J; WOOL, A et al.Lecture notes in computer science. 2000, pp 333-352, issn 0302-9743, isbn 3-540-67907-3Conference Paper

Cryptanalysis of the EMD mode of operationJOUX, Antoine.Lecture notes in computer science. 2003, pp 1-16, issn 0302-9743, isbn 3-540-14039-5, 16 p.Conference Paper

Thomas Young and the rosetta stone = Thomas Young et la Pierre de RosetteROBINSON, Andrew.Endeavour (English ed.). 2007, Vol 31, Num 2, pp 59-64, issn 0160-9327, 6 p.Article

Threshold Cryptography Based on Asmuth-Bloom Secret SharingKAYA, Kamer; SELQUK, Ali Aydin; TEZCAN, Zahir et al.Lecture notes in computer science. 2006, pp 935-942, issn 0302-9743, isbn 3-540-47242-8, 1Vol, 8 p.Conference Paper

Efficient cryptographic hardware using the co-design methodologyDE MACEDO MOURELLE, Luiza; NEDJAH, Nadia.International conference on information technology. 2004, pp vol2.508-512, isbn 0-7695-2108-8, 2VolConference Paper

Non-cryptographic primitive for pseudorandom permutationIWATA, Tetsu; YOSHINO, Tomonobu; KUROSAWA, Kaoru et al.Theoretical computer science. 2003, Vol 306, Num 1-3, pp 139-154, issn 0304-3975, 16 p.Article

A fundamental framework for network securitySCHUMACHER, H. J; GHOSH, S.Journal of network and computer applications. 1997, Vol 20, Num 3, pp 305-322, issn 1084-8045Article

Encryption board for IUT-T standard audiovisual servicesMATSUMOTO, H; OYAIZU, I.NTT review. 1994, Vol 6, Num 2, pp 32-38, issn 0915-2334Article

Non-interactive auction scheme with strong privacyKUN PENG; BOYD, Colin; DAWSON, Ed et al.Lecture notes in computer science. 2003, pp 407-420, issn 0302-9743, isbn 3-540-00716-4, 14 p.Conference Paper

  • Page / 18