1018 results in Cryptography ,Cryptology and Coding
Chapter 3 - Polynomials over Finite Fields
-
- Book:
- Introduction to Finite Fields and their Applications
- Published online:
- 05 June 2012
- Print publication:
- 21 July 1994, pp 76-131
-
- Chapter
- Export citation
List of Symbols
-
- Book:
- Introduction to Finite Fields and their Applications
- Published online:
- 05 June 2012
- Print publication:
- 21 July 1994, pp 406-409
-
- Chapter
- Export citation
Preface to the revised edition
-
- Book:
- Introduction to Finite Fields and their Applications
- Published online:
- 05 June 2012
- Print publication:
- 21 July 1994, pp xi-xii
-
- Chapter
- Export citation
Chapter 9 - Cryptology
-
- Book:
- Introduction to Finite Fields and their Applications
- Published online:
- 05 June 2012
- Print publication:
- 21 July 1994, pp 344-373
-
- Chapter
- Export citation
Chapter 4 - Factorization of Polynomials
-
- Book:
- Introduction to Finite Fields and their Applications
- Published online:
- 05 June 2012
- Print publication:
- 21 July 1994, pp 132-165
-
- Chapter
- Export citation
Index
-
- Book:
- Introduction to Finite Fields and their Applications
- Published online:
- 05 June 2012
- Print publication:
- 21 July 1994, pp 410-416
-
- Chapter
- Export citation
Chapter 7 - Theoretical Applications of Finite Fields
-
- Book:
- Introduction to Finite Fields and their Applications
- Published online:
- 05 June 2012
- Print publication:
- 21 July 1994, pp 256-304
-
- Chapter
- Export citation
Chapter 1 - Algebraic Foundations
-
- Book:
- Introduction to Finite Fields and their Applications
- Published online:
- 05 June 2012
- Print publication:
- 21 July 1994, pp 1-43
-
- Chapter
- Export citation
4 - An open architecture number sieve
-
-
- Book:
- Number Theory and Cryptography
- Published online:
- 05 May 2013
- Print publication:
- 19 April 1990, pp 38-75
-
- Chapter
- Export citation
20 - Thue equations and multiplicative independence
-
-
- Book:
- Number Theory and Cryptography
- Published online:
- 05 May 2013
- Print publication:
- 19 April 1990, pp 213-220
-
- Chapter
- Export citation
Introduction
-
- Book:
- Number Theory and Cryptography
- Published online:
- 05 May 2013
- Print publication:
- 19 April 1990, pp ix-xii
-
- Chapter
- Export citation
11 - Privacy for MACNET
-
-
- Book:
- Number Theory and Cryptography
- Published online:
- 05 May 2013
- Print publication:
- 19 April 1990, pp 137-148
-
- Chapter
- Export citation
14 - The tactical frequency management problem: heuristic search and simulated annealing
-
-
- Book:
- Number Theory and Cryptography
- Published online:
- 05 May 2013
- Print publication:
- 19 April 1990, pp 165-174
-
- Chapter
- Export citation
Contents
-
- Book:
- Number Theory and Cryptography
- Published online:
- 05 May 2013
- Print publication:
- 19 April 1990, pp v-vi
-
- Chapter
- Export citation
22 - Universal families of abelian varieties
-
-
- Book:
- Number Theory and Cryptography
- Published online:
- 05 May 2013
- Print publication:
- 19 April 1990, pp 227-236
-
- Chapter
- Export citation
8 - Linear feedback shift registers and stream ciphers
-
-
- Book:
- Number Theory and Cryptography
- Published online:
- 05 May 2013
- Print publication:
- 19 April 1990, pp 106-119
-
- Chapter
- Export citation
II - CRYPTOGRAPHIC DEVICES AND APPLICATIONS
-
- Book:
- Number Theory and Cryptography
- Published online:
- 05 May 2013
- Print publication:
- 19 April 1990, pp -
-
- Chapter
- Export citation
12 - Authentication
-
-
- Book:
- Number Theory and Cryptography
- Published online:
- 05 May 2013
- Print publication:
- 19 April 1990, pp 149-155
-
- Chapter
- Export citation
17 - Number theoretic problems involving two independent bases
-
-
- Book:
- Number Theory and Cryptography
- Published online:
- 05 May 2013
- Print publication:
- 19 April 1990, pp 196-203
-
- Chapter
- Export citation
18 - A class of normal numbers II
-
-
- Book:
- Number Theory and Cryptography
- Published online:
- 05 May 2013
- Print publication:
- 19 April 1990, pp 204-210
-
- Chapter
- Export citation