Search for persons
X
?
Information Security Applications; Lecture Notes in Computer Science ,
9
Detecting Block Cipher Encryption for Defense Against Crypt..:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
10
Impact of Optimized Operations $$A\cdot B$$, $$A\cdot C$$ f..:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
12