Author:
Desmedt Yvo,Le Tri V.,Quisquater Jean-Jacques
Publisher
Springer Berlin Heidelberg
Reference22 articles.
1. Biham, E.: Lecture given at Daghstuhl, Germany, September 21–26 (1997)
2. Blakley, G.R.: Safeguarding cryptographic keys. In: Proc. Nat. Computer Conf. AFIPS Conf. Proc., vol. 48, pp. 313–317 (1979)
3. Blakley, G.R., Swanson, L.: Infinite structures in information theory. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology. Proc. of Crypto’82, Santa Barbara, CA, pp. 39–50. Plenum Press, N.Y (1983)
4. Blum, M., Kannan, S.: Designing programs that check their work. 21st ACM STOC, 86–97 (1989)
5. Carlson, G.E.: Signal and Linear System Analysis. John Wiley & Sons, New York, second edition (1998)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Brief Survey of Research Jointly with Jean-Jacques Quisquater;Cryptography and Security: From Theory to Applications;2012