Burek, Elżbieta
10  results:
Search for persons X
?
1

Unsafe Mechanisms of Bluetooth, $$E_0$$ Stream Cipher Crypt..:

, In: Computational Science – ICCS 2024; Lecture Notes in Computer Science,
 
?
2

Transformation of Elliptic Curve Discrete Logarithm Problem..:

Wroński, Michał ; Burek, Elżbieta ; Dzierzkowski, Łukasz.
Journal of Telecommunications and Information Technology.  1 (2024)  2024 - p. 75-82 , 2024
 
?
3

Searching for an Efficient System of Equations Defining the..:

Burek, Elżbieta ; Mańk, Krzysztof ; Wroński, Michał
Journal of Telecommunications and Information Technology.  4 (2023)  2023 - p. 30-37 , 2023
 
?
5

Quantum Annealing and Algebraic Attack on Speck Cipher:

, In: Computational Science – ICCS 2022; Lecture Notes in Computer Science,
Burek, Elżbieta ; Wroński, Michał - p. 143-149 , 2022
 
?
 
?
9

SIDH Hybrid Schemes with Classical Component Based on the D..:

Michał Wroński ; Elżbieta Burek ; Łukasz Dzierzkowski
https://journals.pan.pl/Content/115223/PDF/60_2545_Wronski_L_skl_new.pdf.  , 2020
 
1-10