Amanote Research

Amanote Research

    RegisterSign In

Cryptographic Applications of the Duplex Construction

Annales UMCS, Informatica
doi 10.2478/umcsinfo-2014-0002
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2014

Authors
Mariusz Borowski
Publisher

Uniwersytetu Marii Curie-Sklodowskiej w Lublinie


Related search

Cryptographic Applications of T-Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

Properties of the Discrete Differential With Cryptographic Applications

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Long Modular Multiplication for Cryptographic Applications

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

Formally Verified Cryptographic Web Applications in WebAssembly

2019English

On Difference Maps and Their Cryptographic Applications

English

Cryptographic Applications of Sparse Polynomials Over Finite Rings

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2001English

An Efficient Construction of a Compression Function for Cryptographic Hash

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2016English

Efficient Pseudo-Chaotic Number Generator for Cryptographic Applications

International Journal of Intelligent Computing Research
2020English

Design and Implementation of Robust Embedded Processor for Cryptographic Applications

2010English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy