Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-5
|
Results: 5
Decompositions of cascaded GMW functions
Authors:
Dai, ZD Gong, G Ye, DF
Citation:
Zd. Dai et al., Decompositions of cascaded GMW functions, SCI CHINA A, 44(6), 2001, pp. 709-717
Decomposing attacks on asymmetric cryptography based on mapping compositions
Authors:
Ye, DF Dai, ZD Lam, KY
Citation:
Df. Ye et al., Decomposing attacks on asymmetric cryptography based on mapping compositions, J CRYPTOL, 14(2), 2001, pp. 137-150
Growth inhibition of interleukin-2 receptor gene-transduced peripheral blood lymphocytes on human ovarian cancer cells
Authors:
Ye, DF Xie, X Lu, WG Chen, HZ Cheng, B
Citation:
Df. Ye et al., Growth inhibition of interleukin-2 receptor gene-transduced peripheral blood lymphocytes on human ovarian cancer cells, CHIN MED J, 114(3), 2001, pp. 303-307
Cryptanalysis of ElGamal type encryption schemes based on conic curves
Authors:
Dai, ZD Ye, DF Pei, DY Yang, JH
Citation:
Zd. Dai et al., Cryptanalysis of ElGamal type encryption schemes based on conic curves, ELECTR LETT, 37(7), 2001, pp. 426-426
Cryptanalysis of Wang's original and revised digital signature scheme
Authors:
Dai, ZD Yang, JH Ye, DF Gong, G
Citation:
Zd. Dai et al., Cryptanalysis of Wang's original and revised digital signature scheme, ELECTR LETT, 37(4), 2001, pp. 220-220
Risultati:
1-5
|