Magnifying computing gaps. Establishing encrypted communication over unidirectional channels
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1256724 (Why is no real title available?)
- scientific article; zbMATH DE number 1256737 (Why is no real title available?)
- scientific article; zbMATH DE number 708802 (Why is no real title available?)
- scientific article; zbMATH DE number 1031003 (Why is no real title available?)
- scientific article; zbMATH DE number 1559544 (Why is no real title available?)
- scientific article; zbMATH DE number 1775383 (Why is no real title available?)
- scientific article; zbMATH DE number 1361466 (Why is no real title available?)
- scientific article; zbMATH DE number 2086371 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Analysis and optimization of the twinkle factoring device
- Conditionally-perfect secrecy and a provably-secure randomized cipher
- Nested Merkle's puzzles against sampling attacks
- One way functions and pseudorandom generators
- Secure communications over insecure channels
- Self-stabilization
- Self-stabilizing systems in spite of distributed control
This page was built for publication: Magnifying computing gaps. Establishing encrypted communication over unidirectional channels
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q290516)