Showing 1 - 20 results of 291 Refine Results
  1. 1
    Conference

    Source: 2024 International Symposium on Information Theory and Its Applications (ISITA) Information Theory and Its Applications (ISITA), 2024 International Symposium on. :308-313 Nov, 2024

    Relation: 2024 International Symposium on Information Theory and Its Applications (ISITA)

  2. 2
  3. 3
  4. 4
  5. 5
    Conference

    Source: 2018 International Symposium on Information Theory and Its Applications (ISITA) Information Theory and Its Applications (ISITA), 2018 International Symposium on. :70-74 Oct, 2018

    Relation: 2018 International Symposium on Information Theory and Its Applications (ISITA)

  6. 6
    Conference

    Source: 2018 IEEE International Symposium on Information Theory (ISIT) Information Theory (ISIT), 2018 IEEE International Symposium on. :2416-2420 Jun, 2018

    Relation: 2018 IEEE International Symposium on Information Theory (ISIT)

  7. 7
  8. 8
    Academic Journal

    This result is not displayed to guests.

  9. 9
    Academic Journal

    This result is not displayed to guests.

  10. 10
    Report

    Source: P. Gaborit, O. Ruatta, J. Schrek, G. Zemor. New results for rank-based cryptography. In Progress in Cryptology (AFRICACRYPT 2014), pp. 1-12

  11. 11
    Conference

    Source: 2015 IEEE International Symposium on Information Theory (ISIT) Information Theory (ISIT), 2015 IEEE International Symposium on. :2688-2691 Jun, 2015

    Relation: 2015 IEEE International Symposium on Information Theory (ISIT)

  12. 12
  13. 13
  14. 14
    Conference

    Source: 2014 IEEE International Symposium on Information Theory Information Theory (ISIT), 2014 IEEE International Symposium on. :1534-1538 Jun, 2014

    Relation: 2014 IEEE International Symposium on Information Theory (ISIT)

  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20