X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (239) 239
Conference Proceeding (115) 115
Book / eBook (21) 21
Book Chapter (20) 20
Web Resource (19) 19
Patent (12) 12
Magazine Article (3) 3
Publication (3) 3
Dissertation (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
computer science (83) 83
cryptography (67) 67
data encryption (55) 55
algorithms (34) 34
computer science, information systems (34) 34
computer security (34) 34
computer science, theory & methods (32) 32
coding and information theory (31) 31
algorithm analysis and problem complexity (29) 29
computer communication networks (29) 29
systems and data security (29) 29
mathematics (28) 28
mathematics, applied (28) 28
cryptology (24) 24
management of computing and information systems (24) 24
boolean functions (23) 23
engineering, electrical & electronic (23) 23
electronic books (20) 20
computers (19) 19
computers and society (19) 19
mathematical analysis (19) 19
computer software (18) 18
data protection (18) 18
polynomials (18) 18
coding theory (17) 17
congresses (17) 17
data structures, cryptology and information theory (17) 17
information security (16) 16
stream cipher (16) 16
discrete mathematics in computer science (15) 15
shift registers (15) 15
construction (14) 14
computer security congresses (13) 13
data encoding (13) 13
encryption of data (13) 13
information and communication, circuits (13) 13
kongress (13) 13
kryptologie (13) 13
protection (13) 13
security measures (13) 13
verschlüsselung (13) 13
computer privacy (12) 12
computer system security (12) 12
computer systems (12) 12
criptografía (12) 12
cyber security (12) 12
cybersecurity (12) 12
electric communication technique (12) 12
electricity (12) 12
electronic digital computers (12) 12
kryptoanalyse (12) 12
protection of computer systems (12) 12
security of computer systems (12) 12
sequences (12) 12
transmission of digital information, e.g. telegraphiccommunication (12) 12
computer communication systems (11) 11
information systems and communication service (11) 11
security (11) 11
software, computer (11) 11
analysis (10) 10
ciphers (10) 10
computational complexity (10) 10
computers and civilization (10) 10
cryptanalysis (10) 10
data encryption congresses (10) 10
information systems (10) 10
information theory (10) 10
informatique (10) 10
mathematics of computing (10) 10
algebra (9) 9
authentifikation (9) 9
cryptography congresses (9) 9
encryption (9) 9
informatik (9) 9
linear codes (9) 9
linear complexity (9) 9
multi-user (9) 9
stream ciphers (9) 9
algebraic immunity (8) 8
computer networks (8) 8
computer science - cryptography and security (8) 8
computer science, hardware & architecture (8) 8
mathematical models (8) 8
privacy (8) 8
94a55 (7) 7
block cipher (7) 7
complexity (7) 7
computersicherheit (7) 7
datensicherung (7) 7
datenverschlüsselung (7) 7
dynamics (7) 7
feedback (7) 7
information storage and retrieval (7) 7
information systems applications (7) 7
management information systems (7) 7
nonlinear feedback (7) 7
operating systems (7) 7
peking (7) 7
systemsicherheit (7) 7
boolean algebra (6) 6
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2018, Lecture Notes in Computer Science, ISBN 3319751603, Volume 10726
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt... 
Computer science | Computers | Coding theory | Data encryption (Computer science) | Law and legislation | Data mining | Computer security | Computers and civilization
Web Resource
2017, Lecture Notes in Computer Science, ISBN 3319547046, Volume 10143
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt... 
Computer science | Computer communication systems | Data encryption (Computer science) | Computer security | Computers and civilization | Software engineering
Web Resource
2015, Lecture Notes in Computer Science, ISBN 9783319167459, Volume 8957
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt... 
Computer science | Coding theory | Data encryption (Computer science) | Computer software | Data protection | Computational complexity
Web Resource
2015, Lecture Notes in Computer Science, ISBN 9783319167459, Volume 8957
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt... 
Computer science | Coding theory | Data encryption (Computer science) | Computer software | Data protection | Computational complexity
Web Resource
IEEE Transactions on Information Theory, ISSN 0018-9448, 01/2017, Volume 63, Issue 2, p. 1325
  We consider the adjacency graphs of the linear feedback shift registers (LFSRs) with characteristic polynomials of the form l(x)p(x) , where l(x) is a... 
Graph theory | Polynomials | Information theory
Journal Article
The Computer Journal, ISSN 0010-4620, 09/2019
Abstract Grain is a hardware-oriented finalist in the eSTREAM Stream Cipher Project. As a particular Galois nonlinear feedback shift register (NFSR), cascade... 
Journal Article
IEEE Transactions on Communications, ISSN 0090-6778, 06/2016, Volume 64, Issue 6, pp. 2274 - 2284
Journal Article
2014, Lecture Notes in Computer Science, ISBN 3319120867, Volume 8567
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt... 
Computer science | Coding theory | Data encryption (Computer science) | Computer software | Data protection
Web Resource
Theoretical Computer Science, ISSN 0304-3975, 05/2017, Volume 676, pp. 52 - 68
Solving polynomial systems with noise over is a fundamental problem in computer science, especially in cryptanalysis. is a new method for solving this problem... 
Serpent | Boolean polynomial system with noise | ISBS method | Cold Boot attack | Max-PoSSo
Journal Article
Theoretical Computer Science, ISSN 0304-3975, 05/2017, Volume 676, p. 52
To access, purchase, authenticate, or subscribe to the full-text of this article, please visit this link: http://dx.doi.org/10.1016/j.tcs.2017.03.005 
Computer science | Algorithms | Analysis
Journal Article
Theoretical Computer Science, ISSN 0304-3975, 05/2017, Volume 676, pp. 52 - 68
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 09/2018, Volume 64, Issue 9, pp. 6429 - 6442
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 04/2018, Volume 64, Issue 4, pp. 2941 - 2952
Journal Article
2011, Lecture Notes in Computer Science, ISBN 9783642215186, Volume 6584
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt... 
Computer science | Data encryption (Computer science) | Computer software | Data protection | Information Systems | Computer Communication Networks
Web Resource
IEEE Transactions on Information Theory, ISSN 0018-9448, 05/2018, Volume 64, Issue 5, pp. 3944 - 3952
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.