Results 61 to 70 of about 172 (89)
Construction of pseudorandom binary sequences using additive characters over GF(2k) II [PDF]
Folláth, János
core +1 more source
Construction of pseudorandom binary sequences using additive characters over GF(2k) [PDF]
Folláth, János
core +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
ACTA AGRONOMICA SINICA
: To elucidate the effects of major climatic factors and key agronomic traits on yield formation of winter rapeseed in the middle Yangtze Basin, this study takes the 30°N latitude as a geographical boundary to systematically compare the ecological ...
Rui Yang +8 more
semanticscholar +1 more source
: To elucidate the effects of major climatic factors and key agronomic traits on yield formation of winter rapeseed in the middle Yangtze Basin, this study takes the 30°N latitude as a geographical boundary to systematically compare the ecological ...
Rui Yang +8 more
semanticscholar +1 more source
Novel Zaslavsky Map Based Pseudorandom Bit Generation Scheme
, 2014B. Stoyanov +2 more
semanticscholar +1 more source
A novel symmetric block cipher algorithm based on two-key dependent permutation
, 2016Arulmani Kuppusamy +3 more
semanticscholar +1 more source
A Secure Cryptosystem Using the Decimal Expansion of an Irrational Number
, 2015M. Viswanath, M. R. Kumar
semanticscholar +1 more source
Crypto applications of combinatorial group theory
Information Security, Coding Theory and Related Combinatorics, 2011Ivana D. Ilić, S. Magliveras
semanticscholar +1 more source
On Necessary Conditions for Secure Distributed Computation
Distributed Computing And Cryptography, 1989R. Ostrovsky, M. Yung
semanticscholar +1 more source
ECG signals recruitment to implement a new technique for medical image encryption
Journal of Discrete Mathematical Sciences and Cryptography, 2021Abdulbaqi As, Ahmed J Obaid
exaly

