-
1دورية أكاديمية
المؤلفون: Emanuele Bellini, David Gerault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin
المصدر: IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 2 (2023)
مصطلحات موضوعية: Cryptanalysis, Differential-Linear Attack, ChaCha20, Computer engineering. Computer hardware, TK7885-7895
وصف الملف: electronic resource
-
2دورية أكاديمية
المؤلفون: Rusydi H. Makarim, Raghvendra Rohit
المصدر: IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 3 (2022)
مصطلحات موضوعية: Ascon, Active Sboxes, Differential trail, Satisfiability Modulo Theories (SMT), Mixed Integer Linear Programming (MILP), Computer engineering. Computer hardware, TK7885-7895
وصف الملف: electronic resource
-
3
المؤلفون: Emanuele Bellini, David Gerault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin
المصدر: Topics in Cryptology – CT-RSA 2023 ISBN: 9783031308710
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::a99c3d9ed6b1e896801840b26caa5b47
https://doi.org/10.1007/978-3-031-30872-7_10 -
4
المؤلفون: Emanuele Bellini, Rusydi H. Makarim, Carlo Sanna, Javier Verbel
المصدر: Progress in Cryptology-AFRICACRYPT 2022 ISBN: 9783031174322
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c5e1098584355068e87552d911d17c07
http://hdl.handle.net/11583/2972108 -
5
المؤلفون: Rusydi H. Makarim, Emanuele Bellini, Carlos Aguilar-Melchor, Nicolas Aragon, Chiara Marcolla, Florian Caullery
المصدر: SN Computer Science. 2
مصطلحات موضوعية: Reduction (complexity), symbols.namesake, Gaussian elimination, Computer science, Galois theory, Rank (computer programming), symbols, Multiplication, Key encapsulation, Intrinsics, Constant (mathematics), Algorithm
-
6
المؤلفون: Rusydi H. Makarim, Victor Mateu, Emanuele Bellini, Chiara Marcolla, Florian Caullery, Marc Manzano
المصدر: ICCD
مصطلحات موضوعية: Post-quantum cryptography, 021103 operations research, Theoretical computer science, business.industry, Computer science, Polynomial arithmetic, Rank (computer programming), 0211 other engineering and technologies, Hamming distance, Cryptography, 02 engineering and technology, Finite field, Metric (mathematics), 0202 electrical engineering, electronic engineering, information engineering, Cryptosystem, 020201 artificial intelligence & image processing, business
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::92bda034655520668f982f786ba544b6
https://doi.org/10.1109/iccd46524.2019.00051 -
7
-
8
المؤلفون: Rusydi H. Makarim, Putranto Hadi Utomo
المساهمون: Discrete Mathematics
المصدر: Mathematics in Computer Science, 11(3-4). Birkhäuser Verlag
Mathematics in Computer Science, 11(3-4), 515-526مصطلحات موضوعية: Discrete mathematics, Ideal (set theory), Puzzle, Applied Mathematics, 010102 general mathematics, MathematicsofComputing_GENERAL, Binary number, System of polynomial equations, 0102 computer and information sciences, Symbolic computation, 01 natural sciences, Combinatorics, Set (abstract data type), Computational Mathematics, Gröbner basis, Computational Theory and Mathematics, 010201 computation theory & mathematics, SAT problem, 0101 mathematics, Boolean satisfiability problem, Integer (computer science), Mathematics, NP-complete
وصف الملف: application/pdf
-
9
المؤلفون: Cihangir Tezcan, Rusydi H. Makarim
المصدر: Lecture Notes in Computer Science ISBN: 9783319163628
LightSecمصطلحات موضوعية: Discrete mathematics, Quadratic equation, Physics::Space Physics, Autocorrelation, Truncated differential cryptanalysis, Inverse, Astrophysics::Cosmology and Extragalactic Astrophysics, Linear complex structure, Linear approximation, Invariant (mathematics), Physics::Geophysics, Mathematics, Block cipher
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::0f4edb23819df432a1803de75bfcdba3
https://doi.org/10.1007/978-3-319-16363-5_7 -
10
المصدر: UKSim
مصطلحات موضوعية: Offset (computer science), Database, business.industry, Computer science, Hash function, Watermark, Cryptography, computer.software_genre, Computer security, Digital signature, Data_FILES, Blind signature, Communication source, business, computer, Digital watermarking
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::d0c4b5d44abf361b7472199e25853dc0
https://doi.org/10.1109/uksim.2012.81