Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- business 5 Treffer
- business.industry 5 Treffer
- computer science 4 Treffer
- arithmetic 2 Treffer
- computer 2 Treffer
-
45 weitere Werte:
- computer security 2 Treffer
- computer.software_genre 2 Treffer
- digital signature 2 Treffer
- elliptic curve cryptography 2 Treffer
- hardware_arithmeticandlogicstructures 2 Treffer
- hash function 2 Treffer
- signature (logic) 2 Treffer
- authentication 1 Treffer
- chip 1 Treffer
- collision attack 1 Treffer
- computer engineering 1 Treffer
- computer network 1 Treffer
- computer science::cryptography and security 1 Treffer
- cryptography 1 Treffer
- cycles per instruction 1 Treffer
- distributed computing 1 Treffer
- elliptic curve 1 Treffer
- exponentiation 1 Treffer
- factoring 1 Treffer
- faculty of science\mathematics 1 Treffer
- grid 1 Treffer
- grid security infrastructure 1 Treffer
- homomorphic encryption 1 Treffer
- informatica 1 Treffer
- integer factorization 1 Treffer
- key exchange 1 Treffer
- key generation 1 Treffer
- key size 1 Treffer
- mathematics 1 Treffer
- mobile agent 1 Treffer
- modular arithmetic 1 Treffer
- modular exponentiation 1 Treffer
- number theory 1 Treffer
- power analysis 1 Treffer
- prime numbers 1 Treffer
- pseudorandom number generator 1 Treffer
- pseudorandomness 1 Treffer
- random oracle 1 Treffer
- research groups and centres\information security\ information security group 1 Treffer
- rsa 1 Treffer
- rsa cryptosystem 1 Treffer
- scalar multiplication 1 Treffer
- secure communication 1 Treffer
- security 1 Treffer
- semantic security 1 Treffer
Sprache
8 Treffer
-
In: Journal of Cryptology: The Journal of the International Association for Cryptologie Research (IACR), Jg. 8 (1995-03-01), Heft 2, S. 101-114Online academicJournalZugriff:
-
In: Journal of Cryptology: The Journal of the International Association for Cryptologie Research (IACR), Jg. 8 (1995-09-01), Heft 3, S. 123-155Online academicJournalZugriff:
-
In: http://www.dgalindo.es/pkc2003-final.pdf, 1993Online academicJournalZugriff:
-
In: The 2nd Information Security Practice and Experience Conference ISPEC2006, Jg. 3903 (2006), S. 33-44Online unknownZugriff:
-
2001Online unknownZugriff: