[go: up one dir, main page]

Barlotti et al., 1992 - Google Patents

COMBINATORICS AND CRYPTOGRAPHY

Barlotti et al., 1992

Document ID
9690175956525739576
Author
Barlotti A
et al.
Publication year
Publication venue
Combinatorics' 90: Recent Trends and Applications

External Links

Snippet

COMBINATORICS AND CRYPTOGRAPHY Page 170 Combinatorics' 90 A. Barlotti et al .( Editors ) © 1992 Elsevier Science Publishers BV All rights reserved. COMBINATORICS AND CRYPTOGRAPHY 159 Franco EUGENI Dipartimento di Ingegneria Elettrica Universita'de …
Continue reading at books.google.com (other versions)

Similar Documents

Publication Publication Date Title
Simmons Symmetric and asymmetric encryption
Diffie et al. Privacy and authentication: An introduction to cryptography
Trappe Introduction to cryptography with coding theory
Feistel Cryptography and computer privacy
Hoffstein et al. An introduction to cryptography
Van Tilborg An introduction to cryptology
Gardner A new kind of cipher that would take millions of years to break
EP0880115B1 (en) Encryption communication system for generating passwords on the basis of start information on both parties of communications
US5696826A (en) Method and apparatus for encrypting and decrypting information using a digital chaos signal
KR101267109B1 (en) Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups
Bright et al. Quasi-random number sequences from a long-period TLP generator with remarks on application to cryptography
US20160012255A1 (en) Method for encoding data on a chip card by means of constant-weight codes
Ryabko et al. Basics of contemporary cryptography for IT practitioners
Diffie et al. Privacy and authentication: an introduction to cryptography
US3657476A (en) Cryptography
Deavours Unicity points in cryptanalysis
Diffie et al. Exhaustive cryptanalysis of the NBS data encryption standard
Sloane Error-correcting codes and cryptography
Barlotti COMBINATORICS AND CRYPTOGRAPHY
Buell Fundamentals of cryptography: introducing mathematical and algorithmic foundations
Disina Robust Caesar Cipher against frequency cryptanalysis using bi-directional shifting
DeMillo Applied Cryptology, cryptographic protocols, and computer security models
Irvine Compression and cryptology
Dass et al. How to share secrets: the idea of Geometric threshold Games
Eugeni Combinatorics and cryptography