Refine your search
Availability
-
Authors
- Alexandra Boldyreva, Daniele Micciancio
- Anne Canteaut, François-Xavier Standaert
- Anne Canteaut, Yuval Ishai
- Bauer Friedrich L
- Chaum David Ed
- Daniele Micciancio, Thomas Ristenpart
- Hovav Shacham, Alexandra Boldyreva
- Jean-Sébastien Coron, Jesper Buus Nielsen
- Jesper Buus Nielsen, Vincent Rijmen
- Jonathan Katz, Hovav Shacham
- Jung Hee Cheon, Tsuyoshi Takagi
- Marc Fischlin, Jean-Sébastien Coron
- Matthew Robshaw, Jonathan Katz
- Mehdi Tibouchi, Huaxiong Wang
- Nyberg Kaisa Ed
- Shweta Agrawal, Dongdai Lin
- Steven D. Galbraith, Shiho Moriai
- Tal Malkin, Chris Peikert
- Thomas Peyrin, Steven Galbraith
- Yevgeniy Dodis, Thomas Shrimpton
- Show more
- Show less
-
Item types
-
Series
- Advanced courses in mathematics CRM Barcelona
- Cryptology and information security series, 1
- Discrete mathematics and its applications
- Lecture notes in computer science; 1403
- Lecture notes in computer science; 196
- Lecture notes in computer science; 209
- Lecture notes in computer science; 218
- Lecture notes in computer science; 219
- Lecture notes in computer science; 263
- Lecture notes in computer science; 293
- Lecture notes in computer science; 304
- Lecture notes in computer science; 325
- Lecture notes in computer science; 330
- Lecture notes in computer science; 403
- Show more
- Show less
-
Topics
- Algorithms
- Coding theory
- Combinatorics
- Computer science
- Computer science
- Computer Science
- Cryoptography
- Cryptography
- Cryptology
- Cryptology
- Cryptology-Computer programming
- Data integrity
- Data protection
- Data security
- Error detection and correction
- Formation of coding
- Hill ciphers
- HISTORY
- Information theory
- Mathematics
- Show more
- Show less
-
Holding libraries
-
Home libraries
-
Languages
