How to Use Exponent Permutations in Cryptography-classification and Applications

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 435
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorPark,SW-
dc.contributor.authorLee, S-
dc.contributor.authorKim, Kwangjo-
dc.date.accessioned2013-03-15T22:12:45Z-
dc.date.available2013-03-15T22:12:45Z-
dc.date.created2012-05-31-
dc.date.issued1996-12-19-
dc.identifier.citationProc. of International Conference on Cryptology and Information Security, v., no., pp. --
dc.identifier.urihttp://hdl.handle.net/10203/124440-
dc.languageENG-
dc.titleHow to Use Exponent Permutations in Cryptography-classification and Applications-
dc.typeConference-
dc.type.rimsCONF-
dc.citation.publicationnameProc. of International Conference on Cryptology and Information Security-
dc.identifier.conferencecountryTaiwan, Province of China-
dc.identifier.conferencecountryTaiwan, Province of China-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorPark,SW-
dc.contributor.nonIdAuthorLee, S-
Appears in Collection
CS-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0