Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             26 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption Okamoto, Tatsuaki
2015
77 2-3 p. 725-771
artikel
2 Almost $$2$$2-perfect $$6$$6-cycle systems Lindner, Charles C.
2015
77 2-3 p. 321-333
artikel
3 Batch verifiable computation of outsourced functions Zhang, Liang Feng
2015
77 2-3 p. 563-585
artikel
4 Enumeration of Kerdock codes of length 64 Phelps, Kevin
2015
77 2-3 p. 357-363
artikel
5 Finding shortest lattice vectors faster using quantum search Laarhoven, Thijs
2015
77 2-3 p. 375-400
artikel
6 Further results on the number of rational points of hyperelliptic supersingular curves in characteristic 2 McGuire, Gary
2015
77 2-3 p. 653-662
artikel
7 Guest Editorial: Special Issue in Honor of Scott A. Vanstone Blake, Ian
2015
77 2-3 p. 287-299
artikel
8 High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers Düll, Michael
2015
77 2-3 p. 493-514
artikel
9 Isogenies of abelian varieties over finite fields Silverberg, Alice
2015
77 2-3 p. 427-439
artikel
10 Linearly homomorphic structure-preserving signatures and their applications Libert, Benoît
2015
77 2-3 p. 441-477
artikel
11 Maximal arcs and quasi-symmetric designs Jungnickel, Dieter
2015
77 2-3 p. 365-374
artikel
12 Normal forms of hyperelliptic curves of genus 3 Frey, Gerhard
2015
77 2-3 p. 677-712
artikel
13 On tight bounds for binary frameproof codes Guo, Chuan
2015
77 2-3 p. 301-319
artikel
14 Open problems in hash function security Andreeva, Elena
2015
77 2-3 p. 611-631
artikel
15 Optimal low-power coding for error correction and crosstalk avoidance in on-chip data buses Chee, Yeow Meng
2015
77 2-3 p. 479-491
artikel
16 PASS-Encrypt: a public key cryptosystem based on partial evaluation of polynomials Hoffstein, Jeffrey
2015
77 2-3 p. 541-552
artikel
17 Perfect hash families of strength three with three rows from varieties on finite projective geometries Fuji-Hara, Ryoh
2015
77 2-3 p. 351-356
artikel
18 Power map permutations and the discrete log problem Landrock, Peter
2015
77 2-3 p. 713-724
artikel
19 Primitive normal bases for quartic and cubic extensions: a geometric approach Hachenberger, Dirk
2015
77 2-3 p. 335-350
artikel
20 Quantifying the security advantage of password expiration policies Chiasson, Sonia
2015
77 2-3 p. 401-408
artikel
21 Reflections on slide with a twist attacks Dinur, Itai
2015
77 2-3 p. 633-651
artikel
22 Some primality tests that eluded Lucas Roettger, E. L.
2015
77 2-3 p. 515-539
artikel
23 Square integer Heffter arrays with empty cells Archdeacon, D. S.
2015
77 2-3 p. 409-426
artikel
24 The asymptotic existence of DR$$(v,k,k-1)$$(v,k,k-1)-BIBDs Lamken, E. R.
2015
77 2-3 p. 553-562
artikel
25 The random oracle model: a twenty-year retrospective Koblitz, Neal
2015
77 2-3 p. 587-610
artikel
26 Zero-knowledge proofs of knowledge for group homomorphisms Maurer, Ueli
2015
77 2-3 p. 663-676
artikel
                             26 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland