„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
Idempotent and p-potent quadratic functions: distribution of nonlinearity and co-dimension
-
Improving algebraic attacks on stream ciphers based on linear feedback shift register over $$\mathbb {F}_{2^k}$$ F 2 k
-
Catch-up TV analytics: statistical characterization and consumption patterns identification on a production service
-
Security and trust management – 6th international workshop ; revised selected papers
-
Data and applications security and privacy XXV – 25th annual IFIP WG 11.3 conference ; proceedings
-
Entropy analysis to classify unknown packing algorithms for malware detection
-
Observing biases in the state: case studies with Trivium and Trivia-SC
-
Special issue on collaborative haptic audio-visual environments and systems
-
Distance-regular Cayley graphs with least eigenvalue $$-2$$ - 2
-
3-Nets realizing a diassociative loop in a projective plane
-
On the extendability of quasidivisible Griesmer arcs
-
Automorphisms of strongly regular graphs with applications to partial difference sets
-
Further results on rational points of the curve $$\displaystyle y^{q^n}-y=\gamma x^{q^h+1} - \alpha $$ y q n - y = γ x q h + 1 - α over $${\mathbb {F}}_{q^m}$$ F q m
-
Non-linear maximum rank distance codes
-
Simultaneous diagonalization of conics in $$PG(2,q)$$ P G ( 2 , q ) – A finite-geometry approach for simultaneous diagonalization of symmetric 3 $$\times $$ × 3 matrices in $$GF(q)$$ G F ( q )
-
Hyperplanes of Hermitian dual polar spaces of rank 3 containing a quad
-
Extending some induced substructures of an inversive plane
-
The structure of dual Grassmann codes
-
The packings of $$\mathrm{PG}(3,3)$$ PG ( 3 , 3 )
-
Transitive hyperovals