-
1
-
-
0026834814
-
Construction of Asymptotically Good Low-Rate Error-Correcting Codes through Pseudo-Random Graphs
-
N. Alon, J. Bruck, J. Naor, M. Naor and R. Roth, Construction of Asymptotically Good Low-Rate Error-Correcting Codes through Pseudo-Random Graphs, IEEE Transactions on Information Theory, vol. 38 (1992), 509-516.
-
(1992)
IEEE Transactions on Information Theory
, vol.38
, pp. 509-516
-
-
Alon, N.1
Bruck, J.2
Naor, J.3
Naor, M.4
Roth, R.5
-
4
-
-
84958641478
-
Differential Fault Analysis of Secret Key Cryptosystems
-
Springr-Verlag LNCS
-
E. Biham and A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, Proc. Advances in Cryptology-Crypto '97, Springr-Verlag LNCS 1294 (1997), 513-525.
-
(1997)
Proc. Advances in Cryptology-Crypto '97
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
6
-
-
0001039461
-
Collusion-Secure Fingerprinting for Digital date
-
D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital date, Proc. Advances in Cryptology-Crypto '95 (1995), 452-465.
-
(1995)
Proc. Advances in Cryptology-Crypto
, vol.95
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
10
-
-
84947937393
-
A Secure, Robust Watermark for Multimedia
-
Cambridge, UK, Springer-Verlag LNCS 1174
-
Cox I., Kilian J., Leighton T. and Shamoon T., A Secure, Robust Watermark for Multimedia, Information Hiding Workshop, Cambridge, UK, Springer-Verlag LNCS 1174, (1996), 185-206.
-
(1996)
Information Hiding Workshop
, pp. 185-206
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
12
-
-
51249175955
-
Families of finite sets in which no set is covered by the union of r others
-
P. Erdös, P. Frankl and Z. Füredi, Families of finite sets in which no set is covered by the union of r others, Israel J. of math. 51 (1985), 79-89.
-
(1985)
Israel J. of math
, vol.51
, pp. 79-89
-
-
Erdös, P.1
Frankl, P.2
Füredi, Z.3
-
14
-
-
0021467937
-
Storing a Sparse Table with 0(1) Worst Case Access Time
-
M.L. Fredman, J. Komlós and E. Szemerédi, Storing a Sparse Table with 0(1) Worst Case Access Time, Journal of the ACM, Vol 31 (1984), 538-544.
-
(1984)
Journal of the ACM
, vol.31
, pp. 538-544
-
-
Fredman, M.L.1
Komlós, J.2
Szemerédi, E.3
-
17
-
-
84954420982
-
Trials of Traced Traitors
-
Cambridge, UK, Springer-Verlag LNCS 1174
-
B. Pfttzmann, Trials of Traced Traitors, Information Hiding Workshop, Cambridge, UK, Springer-Verlag LNCS 1174, (1996), 49-64.
-
(1996)
Information Hiding Workshop
, pp. 49-64
-
-
Pfttzmann, B.1
-
19
-
-
0019572642
-
New Hash Functions and Their Use in Authentication and Set Equality
-
M. N. Wegman and J. L. Carter, New Hash Functions and Their Use in Authentication and Set Equality, Journal of Computer and System Sciences 22 (1981), 265-279.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|