1
2
3
4
Subjects:
“...Cybernetics,Boolean functions,Cryptography...”
text
5
6
by Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, Christos Xenakis
Published 2016-12-01
Subjects:
“...cryptography misuse...”Published 2016-12-01
Get full text
Article
7
by Daniel KL Oi, Alex Ling, Giuseppe Vallone, Paolo Villoresi, Steve Greenland, Emma Kerr, Malcolm Macdonald, Harald Weinfurter, Hans Kuiper, Edoardo Charbon, Rupert Ursin
Published 2017-04-01
Subjects:
“...cryptography...”Published 2017-04-01
Get full text
Article
8
by Aguilar-Melchor Carlos, Barrier Joris, Fousse Laurent, Killijian Marc-Olivier
Published 2016-04-01
Subjects:
“...Lattice-Based Cryptography...”Published 2016-04-01
Get full text
Article
9
by Gizem S. Çetin, Hao Chen, Kim Laine, Kristin Lauter, Peter Rindal, Yuhou Xia
Published 2017-07-01
Subjects:
“...Cryptography...”Published 2017-07-01
Get full text
Article
10
Subjects:
“...Cybernetics,Boolean functions,Algebra,Cryptography...”
text
11
by Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh T. Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, Alexander Schaub
Published 2018-09-01
Subjects:
“...post-quantum cryptography...”Published 2018-09-01
Get full text
Article
12
13
14
15
by Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
Published 2017-12-01
Subjects:
“...permutation-based cryptography...”Published 2017-12-01
Get full text
Article
16
17
18
Subjects:
“...Cryptography,Network operating systems,Computer software...”
text
19
Subjects:
“...Computer networks,Sensors,Cryptography,Data security...”
text
20
Subjects:
“...Digital signatures,Quality assurance,Suppliers,Cryptography theory...”
text