A Complete Bibliography of Publications in the Journal of Cryptology
نویسنده
چکیده
abelian [326, 408, 91, 337]. Abstract [117]. Accelerated [512]. Accelerating [398]. Achieve [477]. Acoustic [525]. Adaptive [241, 390, 471]. Adaptively [523, 390]. Adic [130]. Advance [279]. Adversarial [458]. Adversaries [353, 345, 357, 403, 450, 472, 501, 236]. Adversary [173]. AES [373, 474, 346, 459]. AES-192 [474]. AES-256 [474]. AES-like [459]. after [76]. Against [353, 480, 520, 348, 500, 357, 524, 214, 192,
منابع مشابه
A Complete Bibliography of Publications in the Journal of Cryptology Title Word Cross-reference
Abelian [91]. Abstract [117]. Adic [130]. after [76]. Against [95]. Agreement [128]. Algebraic [64, 92]. Algorithm [146, 74, 154, 79]. Algorithms [88]. Alternative [160]. Ampli cation [129]. Analysis [152, 88, 33, 87]. Any [115, 143]. Application [159, 36]. Applications [123, 149, 92, 155]. Applying [33]. approach [10, 23]. arbitration [22]. Arguments [143]. Arithmetic [68]. assignment [69]. As...
متن کاملA Complete Bibliography of Publications in the Linux Journal and the Embedded Linux Journal
//www.sangoma.com= [?, ?]. /dev [?]. /etc/rant [?]. /etc/rant/ [?]. /opt [?]. / [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?]. /Glade [?]. /strike [?]. [?] userinputTaylor:2014:WSPb. /var/opinion [?, ?]. /proc [?]. /r...
متن کامل