Barlotti et al., 1992 - Google Patents
COMBINATORICS AND CRYPTOGRAPHYBarlotti et al., 1992
- Document ID
- 9690175956525739576
- Author
- Barlotti A
- et al.
- Publication year
- Publication venue
- Combinatorics' 90: Recent Trends and Applications
External Links
Snippet
COMBINATORICS AND CRYPTOGRAPHY Page 170 Combinatorics' 90 A. Barlotti et al .(
Editors ) © 1992 Elsevier Science Publishers BV All rights reserved. COMBINATORICS AND
CRYPTOGRAPHY 159 Franco EUGENI Dipartimento di Ingegneria Elettrica Universita'de …
- 238000000034 method 0 description 7
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Simmons | Symmetric and asymmetric encryption | |
Diffie et al. | Privacy and authentication: An introduction to cryptography | |
Trappe | Introduction to cryptography with coding theory | |
Feistel | Cryptography and computer privacy | |
Hoffstein et al. | An introduction to cryptography | |
Van Tilborg | An introduction to cryptology | |
Gardner | A new kind of cipher that would take millions of years to break | |
EP0880115B1 (en) | Encryption communication system for generating passwords on the basis of start information on both parties of communications | |
US5696826A (en) | Method and apparatus for encrypting and decrypting information using a digital chaos signal | |
KR101267109B1 (en) | Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups | |
Bright et al. | Quasi-random number sequences from a long-period TLP generator with remarks on application to cryptography | |
US20160012255A1 (en) | Method for encoding data on a chip card by means of constant-weight codes | |
Ryabko et al. | Basics of contemporary cryptography for IT practitioners | |
Diffie et al. | Privacy and authentication: an introduction to cryptography | |
US3657476A (en) | Cryptography | |
Deavours | Unicity points in cryptanalysis | |
Diffie et al. | Exhaustive cryptanalysis of the NBS data encryption standard | |
Sloane | Error-correcting codes and cryptography | |
Barlotti | COMBINATORICS AND CRYPTOGRAPHY | |
Buell | Fundamentals of cryptography: introducing mathematical and algorithmic foundations | |
Disina | Robust Caesar Cipher against frequency cryptanalysis using bi-directional shifting | |
DeMillo | Applied Cryptology, cryptographic protocols, and computer security models | |
Irvine | Compression and cryptology | |
Dass et al. | How to share secrets: the idea of Geometric threshold Games | |
Eugeni | Combinatorics and cryptography |