Related articles 1
Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem

Order by:   
Select:   All  None    Download:  

Similar articles
   
Pub. online: 1 Jan 2005      Type: Research Article     
Journal:  Informatica Volume 16, Issue 3 (2005), pp. 383–394
   Abstract