An analysis of a private-key cryptosystem / by Tan Wei-Wey.
Similar Items
Fast Public-Key Cryptosystems: Design And Cryptanalyses
by: Go, Bok Min
Published: (2006)
by: Go, Bok Min
Published: (2006)
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
Influence of pre-exercise soybean-based beverage on biochemical and physiological responses in healthy men / Albert Tan Yi Wey
by: Albert Tan , Yi Wey
Published: (2019)
by: Albert Tan , Yi Wey
Published: (2019)
Online Dissertation Registration System (ODRS) / Tee Siew Wei
by: Tee, Siew Wei
Published: (2005)
by: Tee, Siew Wei
Published: (2005)
New formula to calculate the number of designs in RADG cryptosystem
by: Kadhum, Laith M., et al.
Published: (2021)
by: Kadhum, Laith M., et al.
Published: (2021)
Sistem pemantauan / Ewe Wei Sheng
by: Ewe, Wei Sheng
Published: (2003)
by: Ewe, Wei Sheng
Published: (2003)
Computation of private key for LUC cryptosystem
by: Md Ali, Zulkarnain, et al.
Published: (2009)
by: Md Ali, Zulkarnain, et al.
Published: (2009)
Sistem multimedia kiosks / Cheah Wei Kean
by: Cheah, Wei Kean
Published: (2003)
by: Cheah, Wei Kean
Published: (2003)
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Remote monitoring system / Tan Chin Kee
by: Tan, Chin Kee
Published: (2001)
by: Tan, Chin Kee
Published: (2001)
A study on the effectiveness of US Special Operations Forces / by Leong Kok Wey
by: Leong, Kok Wey
Published: (2002)
by: Leong, Kok Wey
Published: (2002)
Framework to build component based e-Manufacturing / Goh Ki Wei
by: Goh , Ki Wei
Published: (2004)
by: Goh , Ki Wei
Published: (2004)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
Nutritional advisory system using case based approach / Chew Wei Liang
by: Chew , Wei Liang
Published: (2003)
by: Chew , Wei Liang
Published: (2003)
Integrated Hospital System Administration System / Ng Siao Wei
by: Ng , Siao Wei
Published: (2001)
by: Ng , Siao Wei
Published: (2001)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
Internet information server scanner : scanning on URL vulnerabilities / Tan Yu Jin.
by: Tan, Yu Jin
Published: (2002)
by: Tan, Yu Jin
Published: (2002)
A broad survey of Web-based Bioinformatics research and data mining using BLAST / by Tan Wooi Keng.
by: Tan, Wooi Keng
Published: (2002)
by: Tan, Wooi Keng
Published: (2002)
5th residential college web site development / Goh Wei Meng
by: Goh, Wei Meng
Published: (2001)
by: Goh, Wei Meng
Published: (2001)
Key LogiQL Concepts
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Network monopoly / Tan Kean Yeap
by: Tan , Kean Yeap
Published: (2002)
by: Tan , Kean Yeap
Published: (2002)
E-Appraisal system / Tan Lai Yen
by: Tan, Lai Yen
Published: (2005)
by: Tan, Lai Yen
Published: (2005)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
School management system / Tan Swee Ling
by: Tan, Swee Ling
Published: (2002)
by: Tan, Swee Ling
Published: (2002)
Development of interactive resume / Tan Phaik See
by: Tan , Phaik See
Published: (2005)
by: Tan , Phaik See
Published: (2005)
Enhancement of RSA Key Generation Using Identity
by: Norhidayah, Muhammad, et al.
Published: (2015)
by: Norhidayah, Muhammad, et al.
Published: (2015)
An enhanced anycast routing protocol using nearest PIM-SM tree distribution with load-balancing scheme / Jimmy Tan Kai Hong.
by: Tan, Jimmy Kai Hong
Published: (2003)
by: Tan, Jimmy Kai Hong
Published: (2003)
An adaptive QOS scheduling algorithm in service oriented grid and cloud environment / Ang Tan Fong
by: Ang, Tan Fong
Published: (2011)
by: Ang, Tan Fong
Published: (2011)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
by: Taha, Imad, et al.
Published: (1999)
by: Taha, Imad, et al.
Published: (1999)
Grid application / Tan Kien Peng
by: Tan, Kien Peng
Published: (2005)
by: Tan, Kien Peng
Published: (2005)
Phone directory information system PDIS / Tan Yin Shuen
by: Tan, Yin Shuen
Published: (2002)
by: Tan, Yin Shuen
Published: (2002)
Student Marks Management System (SMMS) / Tan Chee Choong
by: Tan, Chee Choong
Published: (2002)
by: Tan, Chee Choong
Published: (2002)
Sistem pengendalian & penyelenggaraan kenderaan UM / Tan Tat San
by: Tan , Tat San
Published: (2001)
by: Tan , Tat San
Published: (2001)
Virtual eStore - VeS.com / Tan Hean Giap
by: Tan, Hean Giap
Published: (2001)
by: Tan, Hean Giap
Published: (2001)
Pakej pengujian IQ kanak-kanak / Tan Ai Chu
by: Tan, Ai Chu
Published: (2003)
by: Tan, Ai Chu
Published: (2003)
Design and development of online survey system / Tan How Kian
by: Tan, How Kian
Published: (2004)
by: Tan, How Kian
Published: (2004)
Design and development of online survey system / Tan Fang Yen
by: Tan, Fang Yen
Published: (2005)
by: Tan, Fang Yen
Published: (2005)
Hardware e-Inventory management system / Tan Kit Huang
by: Tan , Kit Huang
Published: (2003)
by: Tan , Kit Huang
Published: (2003)
Intelligent mobile private tutor finders application
by: Leong, Kam Ga
Published: (2022)
by: Leong, Kam Ga
Published: (2022)
Similar Items
-
Fast Public-Key Cryptosystems: Design And Cryptanalyses
by: Go, Bok Min
Published: (2006) -
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012) -
Influence of pre-exercise soybean-based beverage on biochemical and physiological responses in healthy men / Albert Tan Yi Wey
by: Albert Tan , Yi Wey
Published: (2019) -
Online Dissertation Registration System (ODRS) / Tee Siew Wei
by: Tee, Siew Wei
Published: (2005) -
New formula to calculate the number of designs in RADG cryptosystem
by: Kadhum, Laith M., et al.
Published: (2021)