AAAAAA

   
Results: 1-5 |
Results: 5

Authors: Dai, ZD Gong, G Ye, DF
Citation: Zd. Dai et al., Decompositions of cascaded GMW functions, SCI CHINA A, 44(6), 2001, pp. 709-717

Authors: Ye, DF Dai, ZD Lam, KY
Citation: Df. Ye et al., Decomposing attacks on asymmetric cryptography based on mapping compositions, J CRYPTOL, 14(2), 2001, pp. 137-150

Authors: Ye, DF Xie, X Lu, WG Chen, HZ Cheng, B
Citation: Df. Ye et al., Growth inhibition of interleukin-2 receptor gene-transduced peripheral blood lymphocytes on human ovarian cancer cells, CHIN MED J, 114(3), 2001, pp. 303-307

Authors: Dai, ZD Ye, DF Pei, DY Yang, JH
Citation: Zd. Dai et al., Cryptanalysis of ElGamal type encryption schemes based on conic curves, ELECTR LETT, 37(7), 2001, pp. 426-426

Authors: Dai, ZD Yang, JH Ye, DF Gong, G
Citation: Zd. Dai et al., Cryptanalysis of Wang's original and revised digital signature scheme, ELECTR LETT, 37(4), 2001, pp. 220-220
Risultati: 1-5 |