Loading…
Loading…
Loading…
Loading…
More Results on Shortest Linear Programs
Banik, Subhadeep, Funabiki, Yuki, Isobe, Takanori
Published in Advances in Information and Computer Security (2019)
Published in Advances in Information and Computer Security (2019)
Get full text
Book Chapter
Loading…
Loading…
FFT Program Generation for Ring LWE-Based Cryptography
Masuda, Masahiro, Kameyama, Yukiyoshi
Published in Advances in Information and Computer Security (2021)
Published in Advances in Information and Computer Security (2021)
Get full text
Book Chapter
Loading…
Loading…
A Trace Map Attack Against Special Ring-LWE Samples
Ikematsu, Yasuhiko, Nakamura, Satoshi, Yasuda, Masaya
Published in Advances in Information and Computer Security (2021)
Published in Advances in Information and Computer Security (2021)
Get full text
Book Chapter
Loading…
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
Sakamoto, Kosei, Minematsu, Kazuhiko, Shibata, Nao, Shigeri, Maki, Kubo, Hiroyasu, Funabiki, Yuki, Bogdanov, Andrey, Morioka, Sumio, Isobe, Takanori
Published in Advances in Information and Computer Security (2019)
Published in Advances in Information and Computer Security (2019)
Get full text
Book Chapter
Loading…
Loading…
Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language
Yamaba, Hisaaki, Sohaimi, Ahmad Saiful Aqmal Bin Ahmad, Usuzaki, Shotaro, Aburada, Kentaro, Mukunoki, Masayuki, Park, Mirang, Okazaki, Naonobu
Published in Advances in Information and Computer Security (2021)
Published in Advances in Information and Computer Security (2021)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…