DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park,SW | - |
dc.contributor.author | Lee, S | - |
dc.contributor.author | Kim, Kwangjo | - |
dc.date.accessioned | 2013-03-15T22:12:45Z | - |
dc.date.available | 2013-03-15T22:12:45Z | - |
dc.date.created | 2012-05-31 | - |
dc.date.issued | 1996-12-19 | - |
dc.identifier.citation | Proc. of International Conference on Cryptology and Information Security, v., no., pp. - | - |
dc.identifier.uri | http://hdl.handle.net/10203/124440 | - |
dc.language | ENG | - |
dc.title | How to Use Exponent Permutations in Cryptography-classification and Applications | - |
dc.type | Conference | - |
dc.type.rims | CONF | - |
dc.citation.publicationname | Proc. of International Conference on Cryptology and Information Security | - |
dc.identifier.conferencecountry | Taiwan, Province of China | - |
dc.identifier.conferencecountry | Taiwan, Province of China | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Park,SW | - |
dc.contributor.nonIdAuthor | Lee, S | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.