Author: Salam Md. Iftekhar
Publisher: Inderscience Publishers
ISSN: 1744-1765
Source: International Journal of Information and Computer Security, Vol.5, Iss.2, 2012-01, pp. : 132-149
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Defending against the pirate evolution attack
By Jin Hongxia
International Journal of Applied Cryptography, Vol. 2, Iss. 1, 2010-07 ,pp. :
Matrix Generators for Exceptional Groups of Lie Type
By Howlett R.B. Rylands L.J. Taylor D.E.
Journal of Symbolic Computation, Vol. 31, Iss. 4, 2001-04 ,pp. :
Keystream cryptanalysis of a chaotic cryptographic method
By Alvarez G. Montoya F. Romera M. Pastor G.
Computer Physics Communications, Vol. 156, Iss. 2, 2004-01 ,pp. :