Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Schlagwort
- public-key cryptography 16 Treffer
- mathematics 15 Treffer
- cryptography 12 Treffer
- discrete mathematics 9 Treffer
- theoretical computer science 8 Treffer
-
45 weitere Werte:
- computer science 7 Treffer
- encryption 7 Treffer
- computer 5 Treffer
- computer science::cryptography and security 5 Treffer
- digital signature 5 Treffer
- algorithm 4 Treffer
- cryptanalysis 4 Treffer
- hardware_arithmeticandlogicstructures 4 Treffer
- law 4 Treffer
- law.invention 4 Treffer
- random oracle 4 Treffer
- 02 engineering and technology 3 Treffer
- 0202 electrical engineering, electronic engineering, information engineering 3 Treffer
- blind signature 3 Treffer
- computation 3 Treffer
- computer security 3 Treffer
- computer.software_genre 3 Treffer
- cryptosystem 3 Treffer
- exponent 3 Treffer
- factoring 3 Treffer
- provable security 3 Treffer
- 01 natural sciences 2 Treffer
- 0102 computer and information sciences 2 Treffer
- 010201 computation theory & mathematics 2 Treffer
- arithmetic 2 Treffer
- computer.programming_language 2 Treffer
- cryptographic protocol 2 Treffer
- discrete logarithm 2 Treffer
- elliptic curve cryptography 2 Treffer
- equivalence (formal languages) 2 Treffer
- factorization 2 Treffer
- hash function 2 Treffer
- key (cryptography) 2 Treffer
- modulo 2 Treffer
- optimal asymmetric encryption padding 2 Treffer
- oracle 2 Treffer
- polynomial 2 Treffer
- ring signature 2 Treffer
- security parameter 2 Treffer
- time complexity 2 Treffer
- trapdoor function 2 Treffer
- 020201 artificial intelligence & image processing 1 Treffer
- 020202 computer hardware & architecture 1 Treffer
- 020204 information systems 1 Treffer
- 020206 networking & telecommunications 1 Treffer
Sprache
22 Treffer
-
In: Journal of Cryptology, Jg. 29 (2014-10-24), S. 220-241Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 17 (2002-08-12), S. 81-104Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 20 (2006-10-09), S. 39-50Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 16 (2003-06-01), S. 185-215Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 13 (2000-03-21), S. 397-416Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 13 (2000-03-01), S. 221-244Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 5 (1992), S. 41-52Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 10 (1997-09-01), S. 233-260Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 5 (1992), S. 139-150Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 20 (2007-07-01), S. 393-393Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 19 (2005-12-19), S. 169-209Online unknownZugriff:
-
In: Journal of Cryptology, 2021Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 31 (2018-06-28), S. 1164-1182Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 30 (2016-02-08), S. 392-443Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 25 (2010-11-09), S. 158-193Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 15 (2002-09-01), S. 223-249Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 14 (2000-11-27), S. 101-119Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 24 (2010-03-16), S. 148-156Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 21 (2007-09-05), S. 27-51Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 14 (2001), Heft 4, S. 255-293Online unknownZugriff: