1018 results in Cryptography ,Cryptology and Coding
References
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 579-602
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp i-iv
-
- Chapter
- Export citation
14 - Factoring and discrete logarithms using pseudorandom walks
- from PART III - EXPONENTIATION, FACTORING AND DISCRETE LOGARITHMS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 262-300
-
- Chapter
- Export citation
PART V - CRYPTOGRAPHY RELATED TO DISCRETE LOGARITHMS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 403-404
-
- Chapter
- Export citation
17 - Lattice basis reduction
- from PART IV - LATTICES
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 347-365
-
- Chapter
- Export citation
PART VI - CRYPTOGRAPHY RELATED TO INTEGER FACTORISATION
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 483-484
-
- Chapter
- Export citation
24 - The RSA and Rabin cryptosystems
- from PART VI - CRYPTOGRAPHY RELATED TO INTEGER FACTORISATION
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 485-512
-
- Chapter
- Export citation
23 - Public key encryption based on discrete logarithms
- from PART V - CRYPTOGRAPHY RELATED TO DISCRETE LOGARITHMS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 469-482
-
- Chapter
- Export citation
11 - Basic algorithms for algebraic groups
- from PART III - EXPONENTIATION, FACTORING AND DISCRETE LOGARITHMS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 215-237
-
- Chapter
- Export citation
25 - Isogenies of elliptic curves
- from PART VII - ADVANCED TOPICS IN ELLIPTIC AND HYPERELLIPTIC CURVES
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 515-544
-
- Chapter
- Export citation
PART III - EXPONENTIATION, FACTORING AND DISCRETE LOGARITHMS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 213-214
-
- Chapter
- Export citation
Subject index
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 608-615
-
- Chapter
- Export citation
7 - Approaching the Shannon limit by turbo coding
-
- Book:
- A Student's Guide to Coding and Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 26 January 2012, pp 143-166
-
- Chapter
- Export citation
1 - Introduction
-
- Book:
- A Student's Guide to Coding and Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 26 January 2012, pp 1-12
-
- Chapter
- Export citation
References
-
- Book:
- A Student's Guide to Coding and Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 26 January 2012, pp 183-186
-
- Chapter
- Export citation
List of contributors
-
- Book:
- A Student's Guide to Coding and Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 26 January 2012, pp ix-x
-
- Chapter
- Export citation
2 - Error-detecting codes
-
- Book:
- A Student's Guide to Coding and Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 26 January 2012, pp 13-30
-
- Chapter
- Export citation
6 - Mutual information and channel capacity
-
- Book:
- A Student's Guide to Coding and Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 26 January 2012, pp 115-142
-
- Chapter
- Export citation
3 - Repetition and Hamming codes
-
- Book:
- A Student's Guide to Coding and Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 26 January 2012, pp 31-54
-
- Chapter
- Export citation
Contents
-
- Book:
- A Student's Guide to Coding and Information Theory
- Published online:
- 05 June 2012
- Print publication:
- 26 January 2012, pp v-viii
-
- Chapter
- Export citation