Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by E. A. Hirsch
Time Hierarchies for Cryptographic Function Inversion With Advice
Journal of Mathematical Sciences
Mathematics
Applied Mathematics
Statistics
Probability
Related publications
What Is...a Cryptographic Boolean Function?
Notices of the American Mathematical Society
Mathematics
Cryptographic Hash Function Using Cellular Automata
International Journal of Computer Applications Technology and Research
An Enhanced Non-Cryptographic Hash Function
International Journal of Computer Applications
Linear Time Hierarchies for a Functional Language Machine Model
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
An Efficient Construction of a Compression Function for Cryptographic Hash
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Software Run-Time Protection: A Cryptographic Issue
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Run-Time Attack Detection in Cryptographic APIs
Self-Organization and Time-Stability of Social Hierarchies
PLoS ONE
Multidisciplinary
Advice for Action With Automatic Feedback Systems
Software Data Engineering for Network eLearning Environments