Author: Iwata T. Yoshino T. Kurosawa K.
Publisher: Elsevier
ISSN: 0304-3975
Source: Theoretical Computer Science, Vol.306, Iss.1, 2003-09, pp. : 139-154
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Cryptographic Applications of Primitive Pythagorean Triples
Cryptologia, Vol. 38, Iss. 3, 2014-07 ,pp. :
On the List of Finite Primitive Permutation Groups of Degree < 50
Journal of Symbolic Computation, Vol. 22, Iss. 2, 1996-02 ,pp. :
Security pitfalls in cryptographic design
Information Management & Computer Security, Vol. 6, Iss. 3, 1998-03 ,pp. :