-
1
-
-
33947599948
-
-
GOST 281.47-89. Cryptographic protection for data processing systems, 1980. White paper, available from http://www.cisco.com/warp/public/732/netflow
-
GOST 281.47-89. Cryptographic protection for data processing systems, 1980. White paper, available from http://www.cisco.com/warp/public/732/netflow
-
-
-
-
2
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
November
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Proceedings of CRYPTO, pp. 1-18, November 2001
-
(2001)
Proceedings of CRYPTO
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
3
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Technical Report 148, Department of Computer Science, University of Auckland, July
-
Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
4
-
-
33746882722
-
Strong cryptography armoured computer viruses forbidding code analysis: The BRADLEY virus
-
Broucek, V, ed, May
-
Filiol, E.: Strong cryptography armoured computer viruses forbidding code analysis: the BRADLEY virus. In: Broucek, V. (ed.) Proceedings of the 14th EICAR Conference, pp. 201-217, May 2005
-
(2005)
Proceedings of the 14th EICAR Conference
, pp. 201-217
-
-
Filiol, E.1
-
5
-
-
33947589470
-
-
Filiol, E.: Techniques virales avancées. Springer, France (2006). An English translation is pending and will be in print at the beginning of 2007
-
Filiol, E.: Techniques virales avancées. Springer, France (2006). An English translation is pending and will be in print at the beginning of 2007
-
-
-
-
7
-
-
0000236696
-
On notation for ordinal numbers
-
Kleene, S.C.: On notation for ordinal numbers. J. Symbolic Logic 3(4), 150-155 (1938)
-
(1938)
J. Symbolic Logic
, vol.3
, Issue.4
, pp. 150-155
-
-
Kleene, S.C.1
-
8
-
-
0041619709
-
-
Lenstra, A.K.: Integer factoring. Des. Codes Cryptograp. 19, 101-128 (2000)
-
Lenstra, A.K.: Integer factoring. Des. Codes Cryptograp. 19, 101-128 (2000)
-
-
-
-
9
-
-
84862747854
-
Thirty years of integer factorization
-
Chyzak F, ed, April 2002
-
Morain, F.: Thirty years of integer factorization. In: Chyzak F. (ed.) Proceedings of the Algorithms Seminar 2000-2001, p. 77-80, April 2002
-
(2000)
Proceedings of the Algorithms Seminar
, pp. 77-80
-
-
Morain, F.1
-
10
-
-
0023985474
-
The notion of security for probabilistic cryptosystems
-
Micali, S., Rackoff, C., Sloan, B.: The notion of security for probabilistic cryptosystems. SIAM J. Comput. 17, 412-426 (1988)
-
(1988)
SIAM J. Comput
, vol.17
, pp. 412-426
-
-
Micali, S.1
Rackoff, C.2
Sloan, B.3
-
13
-
-
85027100501
-
The quadratic sieve factoring algorithm
-
Beth, T, Cot, N, Ingemarsson, I, eds, Advances in Cryptology, Eurocrypt'84, Springer Berlin Heidelberg, Newyork
-
Pomerance, C.: The quadratic sieve factoring algorithm. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) Advances in Cryptology - Eurocrypt'84, LNCS vol. 209, pp. 169-182. Springer Berlin Heidelberg, Newyork (1984)
-
(1984)
LNCS
, vol.209
, pp. 169-182
-
-
Pomerance, C.1
-
14
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J., 28, 656-715 (1949)
-
(1949)
Bell Syst. Tech. J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
15
-
-
23844438042
-
On the time complexity of computer viruses
-
Zuo, Z., Zhou, M.: On the time complexity of computer viruses. IEEE Trans. Informat. Theory 51(8), 2962-2966 (2005)
-
(2005)
IEEE Trans. Informat. Theory
, vol.51
, Issue.8
, pp. 2962-2966
-
-
Zuo, Z.1
Zhou, M.2
|