Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Lyubashevsky, Vadim
2005.
Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques.
Vol. 3624,
Issue. ,
p.
378.
Fouque, Pierre-Alain
Pointcheval, David
Stern, Jacques
and
Zimmer, Sébastien
2006.
Automata, Languages and Programming.
Vol. 4052,
Issue. ,
p.
240.
Park, Sangjoon
Nam, Junghyun
Kim, Seungjoo
and
Won, Dongho
2006.
Topics in Cryptology – CT-RSA 2007.
Vol. 4377,
Issue. ,
p.
309.
Chevassut, Olivier
Fouque, Pierre-Alain
Gaudry, Pierrick
and
Pointcheval, David
2006.
Public Key Cryptography - PKC 2006.
Vol. 3958,
Issue. ,
p.
410.
Atti, Nadia Ben
Diaz–Toca, Gema M.
and
Lombardi, Henri
2006.
The Berlekamp-Massey Algorithm revisited.
Applicable Algebra in Engineering, Communication and Computing,
Vol. 17,
Issue. 1,
p.
75.
Agarwal, Saurabh
and
Frandsen, Gudmund Skovbjerg
2006.
LATIN 2006: Theoretical Informatics.
Vol. 3887,
Issue. ,
p.
30.
Kevenaar, T.
Schrijen, G. J.
Akkermans, A.
Damstra, M.
Tuyls, P.
and
van der Veen, M.
2006.
ISSE 2006 — Securing Electronic Busines Processes.
p.
196.
Zhou, Wenqin
Carette, J.
Jeffrey, D. J.
and
Monagan, M. B.
2006.
Artificial Intelligence and Symbolic Computation.
Vol. 4120,
Issue. ,
p.
254.
Brown, Jaimee
Nieto, Juan Manuel González
and
Boyd, Colin
2006.
Progress in Cryptology - INDOCRYPT 2006.
Vol. 4329,
Issue. ,
p.
176.
Al-Taee, Majid A.
Al-Naima, Fawzi M.
and
Al-Jewad, Bessam
2007.
Symbolic-Numeric Computation.
p.
375.
Arakala, Arathi
Jeffers, Jason
and
Horadam, K. J.
2007.
Advances in Biometrics.
Vol. 4642,
Issue. ,
p.
760.
Liu, Dennis Y. W.
Chang, Shuang
Wong, Duncan S.
and
Mu, Yi
2007.
Advances in Information and Computer Security.
Vol. 4752,
Issue. ,
p.
396.
Tuyls, Pim
and
Kevenaar, Tom
2007.
Security, Privacy, and Trust in Modern Data Management.
p.
417.
Ivanyos, Gábor
Sanselme, Luc
and
Santha, Miklos
2007.
STACS 2007.
Vol. 4393,
Issue. ,
p.
586.
Dodis, Yevgeniy
and
Pietrzak, Krzysztof
2007.
Fast Software Encryption.
Vol. 4593,
Issue. ,
p.
414.
Chai, ZhenChuan
Cao, ZhenFu
and
Dong, XiaoLei
2007.
Identity-based signature scheme based on quadratic residues.
Science in China Series F: Information Sciences,
Vol. 50,
Issue. 3,
p.
373.
Arakala, Arathi
Horadam, K. J.
and
Boztas, Serdar
2008.
Practical considerations for secure minutiae based templates.
p.
53.
Hagedorn, Andrew
Starobinski, David
and
Trachtenberg, Ari
2008.
Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks Using Random Linear Codes.
p.
457.
Kiayias, Aggelos
and
Yung, Moti
2008.
Cryptographic Hardness Based on the Decoding of Reed–Solomon Codes.
IEEE Transactions on Information Theory,
Vol. 54,
Issue. 6,
p.
2752.
Stern, Claudius
Adelt, Philipp
Krummel, Volker
and
Ackermann, Marcel R.
2008.
Reliable Evidence of Data Integrity from an Untrusted Storage Service.
p.
24.