Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
attacking functionals » attaining functionals, attaining fuctionals, teaching functional
functionals function » function function, functions functional, function dysfunction
function attacking » functions attacking, function tracking, function making
parallel function » parallel functional, parallel auction, parallel union
function https » functions https, fiction https
attacking functionals » attaining functionals, attaining fuctionals, teaching functional
functionals function » function function, functions functional, function dysfunction
function attacking » functions attacking, function tracking, function making
parallel function » parallel functional, parallel auction, parallel union
function https » functions https, fiction https
1
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”View full text
Electronic
eBook
3
Published 2008
Table of Contents:
“... of Trivium -- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... -- Fair Partially Blind Signatures -- Attacks -- Parallel Shortest Lattice Vector Enumeration on Graphics...”View full text
Electronic
eBook
5
Published 2005
Table of Contents:
“... and Their Inability to Thwart DPA Attacks -- Hash Functions -- How to Construct Universal One-Way Hash Functions...”View full text
Electronic
eBook
6
Published 2006
Table of Contents:
“... of Asynchronous Automata -- Conjugacy and Equivalence of Weighted Automata and Functional Transducers...”View full text
Electronic
eBook
7
Published 2010
Table of Contents:
“...Invited Talk -- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition...”View full text
Electronic
eBook
8
Published 2012
Table of Contents:
“... Defense Against Insect Herbivore Attack -- Volatiles Mediating Information Between Bacteria and Plants...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“... for Elliptic Curves -- Efficient Pairing Computation with Theta Functions -- Small-Span Characteristic...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...”View full text
Electronic
eBook
11
Published 2015
Table of Contents:
“... Monitoring and Synthesis -- Newton's Forward Difference Equation for Functions from Words to Words -- Degrees...”View full text
Electronic
eBook
12
Published 2008
Table of Contents:
“... de Bruijn Sequences -- Multiplicative Character Sums of Recurring Sequences with Rédei Functions...”View full text
Electronic
eBook
13
Published 2007
Table of Contents:
“... of Group-Based Key Agreement Protocols Using Subgroup Distance Functions -- Cryptanalysis -- Length Based...”View full text
Electronic
eBook
14
Published 2015
Table of Contents:
“... for Probability Density Functions -- Segment Abstraction for Worst-Case Execution Time Analysis -- Automatic...”View full text
Electronic
eBook
15
Published 2012
Table of Contents:
“... BB84 -- Leakage Squeezing of Order Two -- Hash Functions and Stream Cipher -- Collision Attack...”View full text
Electronic
eBook
16
Published 2015
Table of Contents:
“... from Lossy Trapdoor Functions -- Attacking RSA with a Composed Decryption Exponent Using Unravelled...”View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“... Functions over Ring Z p -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences...”View full text
Electronic
eBook
18
Published 2006
Table of Contents:
“... to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed...”View full text
Electronic
eBook
19
Published 2015
Table of Contents:
“... in RBACAdministered Database -- Learning-based Leaf Image Recognition Frameworks -- Massively Parallel Feature...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... -- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks -- Protecting...”View full text
Electronic
eBook



