DC Field | Value | Language |
---|---|---|
dc.contributor.author | Biswas, Bhaskar | ko |
dc.contributor.author | Bhattacharya, Sourabh | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.date.accessioned | 2016-11-30T02:44:36Z | - |
dc.date.available | 2016-11-30T02:44:36Z | - |
dc.date.created | 2016-11-18 | - |
dc.date.issued | 2016-06-23 | - |
dc.identifier.citation | 2016년 한국정보보호학회 하계학술대회 (CISC-S'16), pp.425 - 428 | - |
dc.identifier.uri | http://hdl.handle.net/10203/214194 | - |
dc.language | English | - |
dc.publisher | 한국정보보호학회 | - |
dc.title | A Theoretical Approach to Bayesian Cryptanalysis | - |
dc.type | Conference | - |
dc.type.rims | CONF | - |
dc.citation.beginningpage | 425 | - |
dc.citation.endingpage | 428 | - |
dc.citation.publicationname | 2016년 한국정보보호학회 하계학술대회 (CISC-S'16) | - |
dc.identifier.conferencecountry | KO | - |
dc.identifier.conferencelocation | 부경대학교 대연캠퍼스 | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Biswas, Bhaskar | - |
dc.contributor.nonIdAuthor | Bhattacharya, Sourabh | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.