Amanote Research

Amanote Research

    RegisterSign In

Time Hierarchies for Cryptographic Function Inversion With Advice

Journal of Mathematical Sciences - United States
doi 10.1007/s10958-009-9403-5
Full Text
Open PDF
Abstract

Available in full text

Categories
MathematicsApplied MathematicsStatisticsProbability
Date

April 9, 2009

Authors
D. Yu. GrigorievE. A. HirschK. V. Pervyshev
Publisher

Springer Science and Business Media LLC


Related search

What Is...a Cryptographic Boolean Function?

Notices of the American Mathematical Society
Mathematics
2019English

Cryptographic Hash Function Using Cellular Automata

International Journal of Computer Applications Technology and Research
2016English

An Enhanced Non-Cryptographic Hash Function

International Journal of Computer Applications
2020English

Linear Time Hierarchies for a Functional Language Machine Model

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1996English

An Efficient Construction of a Compression Function for Cryptographic Hash

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2016English

Software Run-Time Protection: A Cryptographic Issue

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1991English

Run-Time Attack Detection in Cryptographic APIs

2017English

Self-Organization and Time-Stability of Social Hierarchies

PLoS ONE
Multidisciplinary
2019English

Advice for Action With Automatic Feedback Systems

Software Data Engineering for Network eLearning Environments
2018English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy