Personensuche
X
?
Code-Based Cryptography; Lecture Notes in Computer Science ,
2
Software Implementation of a Code-Based Key Encapsulation M..:
, In:
?
Selected Studies in Geomorphology, Sedimentology, and Geochemistry; Advances in Science, Technology & Innovation ,
3
The Twihinate–Lamlaga Carbonatite Complex: A Potential Sour..:
, In:
?
Code-Based Cryptography; Lecture Notes in Computer Science ,
5
Security Analysis of a Cryptosystem Based on Subspace Subco..:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2019 ,
6
Improvement of Binary and Non Binary Statistical Decoding A..:
, In:
?
International Series on Public Policy; Social Policy in the Islamic World ,
7
The Effects of Social Protection on Informal Employment: Ev..:
, In:
?
Code-Based Cryptography; Lecture Notes in Computer Science ,
8
DAGS: Reloaded Revisiting Dyadic Key Encapsulation:
, In:
?
Algebra, Codes and Cryptology; Communications in Computer and Information Science ,
9
Designing a Public Key Cryptosystem Based on Quasi-cyclic S..:
, In:
?
Codes, Cryptology and Information Security; Lecture Notes in Computer Science ,
10
Quasi-Dyadic Girault Identification Scheme:
, In:
?
Atlas of Challenges and Opportunities in European Neighbourhoods ,
11