AAAAAA

   
Results: 1-11 |
Results: 11

Authors: Coppersmith, D
Citation: D. Coppersmith, Weakness in quaternion signatures, J CRYPTOL, 14(2), 2001, pp. 77-85

Authors: Arratia, R Bollobas, B Coppersmith, D Sorkin, GB
Citation: R. Arratia et al., Euler circuits and DNA sequencing by hybridization, DISCR APP M, 104(1-3), 2000, pp. 63-96

Authors: Coppersmith, D Shparlinski, I
Citation: D. Coppersmith et I. Shparlinski, On polynomial approximation of the discrete logarithm and the Diffie-Hellman mapping, J CRYPTOL, 13(3), 2000, pp. 339-360

Authors: Coppersmith, D Pak, I
Citation: D. Coppersmith et I. Pak, Random walk on upper triangular matrices mixes rapidly, PROB TH REL, 117(3), 2000, pp. 407-417

Authors: Aggarwal, A Coppersmith, D Khanna, S Motwani, R Schieber, B
Citation: A. Aggarwal et al., The angular-metric traveling salesman problem, SIAM J COMP, 29(3), 2000, pp. 697-711

Authors: Coppersmith, D
Citation: D. Coppersmith, Cryptography (Reprinted from IBM Journal of Research and Development, vol 31, 1987), IBM J RES, 44(1-2), 2000, pp. 246-250

Authors: Coppersmith, D Hong, SJ Hosking, JRM
Citation: D. Coppersmith et al., Partitioning nominal attributes in decision trees, DATA M K D, 3(2), 1999, pp. 197-217

Authors: Coppersmith, D Sorkin, GB
Citation: D. Coppersmith et Gb. Sorkin, Constructive bounds and exact expectations for the random assignment problem, RAND STR AL, 15(2), 1999, pp. 113-144

Authors: Coppersmith, D Schieber, B
Citation: D. Coppersmith et B. Schieber, Lower bounds on the depth of monotone arithmetic computations, J COMPLEX, 15(1), 1999, pp. 17-29

Authors: Peyravian, M Coppersmith, D
Citation: M. Peyravian et D. Coppersmith, A structured symmetric-key block cipher, COMPUT SEC, 18(2), 1999, pp. 134-147

Authors: Coppersmith, D Mitchell, CJ
Citation: D. Coppersmith et Cj. Mitchell, Attacks on MacDES MAC algorithm, ELECTR LETT, 35(19), 1999, pp. 1626-1627
Risultati: 1-11 |