Accès à distance ? S'identifier sur le proxy UCLouvain
Displaying 12 results.
-
- Speech
(1997) 6th IMA International Conference on Cryptography and Coding — ROYAL AGR COLL, CIRENCESTER (England) -
- Journal article
(2005) Designs, Codes and Cryptography — Vol. 36, no. 1, p. 33-43 (2005) -
- Speech
(2003) 5th International Conference on Information and Communications Security — HUEHAOTE CITY(Peoples R China) -
- Journal article
(1999) Journal of Cryptology — Vol. 12, no. 4, p. 241-245 (1999) -
- Journal article
(2004) IEEE Transactions on Computers — Vol. 53, no. 6, p. 760-768 (2004) -
- Journal article
(1997) Electronics Letters — Vol. 33, no. 23, p. 1931-1931 (1997) -
- Journal article
(1996) Electronics Letters — Vol. 32, no. 6, p. 537-538 (1996) -
- Journal article
(1997) Electronics Letters — Vol. 33, no. 23, p. 1938-1938 (1997) -
- Journal article
(1998) Designs, Codes and Cryptography — Vol. 14, no. 1, p. 53-56 (1998) -
- Journal article
(2001) Designs, Codes and Cryptography — Vol. 23, no. 3, p. 297-316 (2001) -
- Speech
(2003) Information and Communications Security. 5th International Conference, ICICS 2003. Proceedings — Huhehaote, China -
- Speech
(2001) Cryptographers Track held at the RSA Conference (CT-RSA) — SAN FRANCISCO(California)