Showing
1 - 2
results of
2
Skip to content
Warning:
Full texts of licensed resources are only available from the TBU university network. You are currently outside this network.
Please log in to access full texts
×
Portal K.UTB
Čeština
Login
TBU Catalog
e-resources
E-THESES
All Fields
Title
Author
Subject
Find
Advanced Search
Page will reload when a filter is removed.
Applied Filters:
Limit to articles with full text available
Page will reload when a filter is removed.
Show filters (1)
Limit to articles with full text available
Search Results - "Miller’s algorithm"
Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Showing
1 - 2
results of
2
Refine Results
Sort
Relevance
Date Descending
Date Ascending
1
Loading…
Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
by
El Mrabet, Nadia
,
Fouotsa, Emmanuel
Published in
Codes, Cryptology, and Information Security
(2015)
Get full text
Book Chapter
Save to List
Saved in:
2
Loading…
Introduction to Identity-Based Encryption
by
Martin, Luther
Year of Publication
2008
Get full text
eBook
Book
Save to List
Saved in:
RSS Feed
Email Search
Save Search
Search History
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit to articles from scholarly journals
Clear Filter
Limit to articles with full text available
Limit to Open Access content
Exclude newspaper articles
Include articles at other libraries
Expand results using synonyms
Format
Book / eBook
1 results
1
Book Chapter
1 results
1
Subject Area
computer science
2 results
2
history & archaeology
1 results
1
Topic
computer science
2 results
2
computer science, theory & methods
2 results
2
science & technology
2 results
2
technology
2 results
2
asymmetric cryptography
1 results
1
chiffrement
1 results
1
See more
Language
English
2 results
2
Year of Publication
From:
To:
Database
Ebook Central - Academic Complete
1 results
1
eBooks on EBSCOhost
1 results
1
Unpaywall
1 results
1