Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Llave investigación")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 157

  • Page / 7

Export

Selection :

  • and

Distinguishing attacks on SOBER-t16 and t32EKDAHL, Patrik; JOHANSSON, Thomas.Lecture notes in computer science. 2002, pp 210-224, issn 0302-9743, isbn 3-540-44009-7, 15 p.Conference Paper

Public-key cryptosystem and digital-signature schemes based on linear algebra over a local ringZU-HUA, S.IEE proceedings. Part E. Computers and digital techniques. 1987, Vol 134, Num 5, pp 254-256, issn 0143-7062Article

A new attack against KhazadMULLER, Frédéric.Lecture notes in computer science. 2003, pp 347-358, issn 0302-9743, isbn 3-540-20592-6, 12 p.Conference Paper

Partitioned encryption and achieving simultaneity by partitioningGALIL, Z; YUNG, M.Information processing letters. 1987, Vol 26, Num 2, pp 81-88, issn 0020-0190Article

Cryptanalysis of SOBER-t32BABBAGE, Steve; DE CANNIERE, Christophe; LANO, Joseph et al.Lecture notes in computer science. 2003, pp 111-128, issn 0302-9743, isbn 3-540-20449-0, 18 p.Conference Paper

Multidimensional search trees that provide new types of memory reductionsWILLARD, D. E.Journal of the Association for Computing Machinery. 1987, Vol 34, Num 4, pp 846-858, issn 0004-5411Article

On the number of keys in minimal 2-3 brother treesSASTRY, V. U. K; MURTHY, T. N. V.International journal of computer mathematics. 1986, Vol 19, Num 3-4, pp 267-269, issn 0020-7160Article

Known orders : unusual locators in indexesHASS WEINBERG, Bella.Indexer. 2007, Vol 25, Num 4, pp 243-253, issn 0019-4131, 11 p.Article

The boomerang attack on 5 and 6-round reduced AESBIRYUKOV, Alex.Lecture notes in computer science. 2005, pp 11-15, issn 0302-9743, isbn 3-540-26557-0, 5 p.Conference Paper

Probabilities related to father-son distances in binary search treesLANGENHOP, C. E; WRIGHT, W. E.SIAM journal on computing (Print). 1986, Vol 15, Num 2, pp 520-530, issn 0097-5397Article

Searchable encryption revisited : Consistency properties, relation to anonymous IBE, and extensionsABDALLA, Michel; BELLARE, Mihir; CATALANO, Dario et al.Lecture notes in computer science. 2005, pp 205-222, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 18 p.Conference Paper

Towards Peer-to-Peer content indexingBAQUERO, Carlos; LOPES, Nuno.Operating systems review. 2003, Vol 37, Num 4, pp 90-96, issn 0163-5980, 7 p.Article

New attacks against standardized MACsJOUX, Antoine; POUPARD, Guillaume; STERN, Jacques et al.Lecture notes in computer science. 2003, pp 170-181, issn 0302-9743, isbn 3-540-20449-0, 12 p.Conference Paper

A dynamic dictionary for priced information with applicationMAHESHWARI, Anil; SMID, Michiel.Lecture notes in computer science. 2003, pp 16-25, issn 0302-9743, isbn 3-540-20695-7, 10 p.Conference Paper

On the success probability of X2-attack on RC6MIAJI, Atsuko; TAKANO, Yuuki.Lecture notes in computer science. 2005, pp 61-74, issn 0302-9743, isbn 3-540-26547-3, 14 p.Conference Paper

A comparison of USMARC and UNIMARC for system designMCKERCHER, B; XIN CHANG, P.International cataloguing and bibliographic control. 1995, Vol 24, Num 2, pp 21-25, issn 1011-8829Article

A research of see also' reference in the terminological dictionary: using semantic relations between entriesFUKUDA, M; KAGEURA, K.Library and Information Science. 1993, Num 31, pp 1-23, issn 0373-4447Article

A combinatorial approach to threshold schemesSTINSON, D. R; VANSTONE, S. A.SIAM journal on discrete mathematics. 1988, Vol 1, Num 2, pp 230-236Article

Linear probing with a nonuniform address distributionPFLUG, G. C; KESSLER, H. W.Journal of the Association for Computing Machinery. 1987, Vol 34, Num 2, pp 397-410, issn 0004-5411Article

Lattice model of browsable data spacesGODIN, R; SAUNDERS, E; GECSEI, J et al.Information sciences. 1986, Vol 40, Num 2, pp 89-116, issn 0020-0255Article

Fibonacci heaps and their uses in improved network optimization algorithmsFREDMAN, M. I; ENDRE TARJAN, R.Journal of the Association for Computing Machinery. 1987, Vol 34, Num 3, pp 596-615, issn 0004-5411Article

Multilevel trie hashing; Hachage digital multiniveauLITWIN, Witold; ZEGOUR, Djamel; LEVY, Gérard et al.Rapports de recherche - INRIA. 1987, Vol 723, issn 0249-6399, 23 p.Report

Approximating functions by their poisson transformPOBLETE, P. V.Information processing letters. 1986, Vol 23, Num 3, pp 127-130, issn 0020-0190Article

A new distinguisher for clock controlled stream ciphersENGLUND, Hakan; JOHANSSON, Thomas.Lecture notes in computer science. 2005, pp 181-195, issn 0302-9743, isbn 3-540-26541-4, 15 p.Conference Paper

The analytical reference in serial cataloging: a new access point in online catalogsKNIESNER, D; WILLMAN, C.The Serials librarian. 1995, Vol 26, Num 2, pp 113-123, issn 0361-526XArticle

  • Page / 7