On Generating Cryptographically Desirable Substitutions

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 329
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKim, Kwangjoko
dc.contributor.authorTsutomu Matsumotoko
dc.contributor.authorHideki Imaiko
dc.date.accessioned2013-02-24T12:22:01Z-
dc.date.available2013-02-24T12:22:01Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued1990-01-
dc.identifier.citationTRANSACTIONS OF THE IEICE , v.73, no.7, pp.1031 - 1035-
dc.identifier.urihttp://hdl.handle.net/10203/57095-
dc.languageEnglish-
dc.publisherIEICE-
dc.titleOn Generating Cryptographically Desirable Substitutions-
dc.typeArticle-
dc.type.rimsART-
dc.citation.volume73-
dc.citation.issue7-
dc.citation.beginningpage1031-
dc.citation.endingpage1035-
dc.citation.publicationnameTRANSACTIONS OF THE IEICE-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorTsutomu Matsumoto-
dc.contributor.nonIdAuthorHideki Imai-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0