-
101Subjects: “...[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]...”
Get access
Conference Object -
102Subjects: “...[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]...”
Get access
Get access
Get access
Conference Object -
103
-
104
-
105
-
106
-
107“... Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems...”
Get access
Get access
Other/Unknown Material -
108by Zhang, Xueying, 1979-“... Includes bibliographical references (leaves 181-196) Cryptography plays an important role in protecting...”
Published 2010
Get access
Thesis -
109
-
110
-
111
-
112
-
113by Ejder, Ozlem“... in the Proceedings of the 18th Conference on Arithmetic, Geometry, Cryptography, and Coding Theory...”
Published 2022
Get access
Text -
114by Ejder, Ozlem“... in the Proceedings of the 18th Conference on Arithmetic, Geometry, Cryptography, and Coding Theory...”
Published 2022
Get access
Get access
Article in Journal/Newspaper -
115by Benson, Donald C“.... Today cryptography is at the center of a debate over national security and individual liberty....”
Published 1999
Get access
Get access
Book Part -
116“... in cryptography and in assessing tests themselves. One PRNG contains [Formula: see text] states in the entropy...”
Get access
Get access
Get access
Article in Journal/Newspaper -
117by Králíková, Jana“... profile of a track, Cryptography and The Tower of Hanoi. I tried to make these exercises to solve real...”
Published 2010
Get access
Thesis -
118by Králíková, Jana“... profile of a track, Cryptography and The Tower of Hanoi. I tried to make these exercises to solve real...”
Published 2010
Get access
Thesis -
119Published in Journal of Physics: Conference Series (2023)“..., as well as cryptography and digital currencies including quantum money. Moreover, he also investigates...”
Get access
Get access
Get access
Article in Journal/Newspaper -
120by Adam Clarridge“... for applications such as cryptography and physical systems modelling, particularly when implemented on specialized...”
Published 2009
Get access
Get access
Text