Spelling suggestions: "subject:"ägyptologie""
11 |
Einsatz kryptographischer Verfahren auf stark ressourcenbeschränkten GerätenWurst, Ulrich. January 2003 (has links)
Stuttgart, Univ., Diplomarb., 2003.
|
12 |
Faktorisierung mit elliptischen KurvenOberfell, Jörg. January 2005 (has links)
Stuttgart, Univ., Studienarb., 2005.
|
13 |
Trapdoor commitment schemes and their applicationsFischlin, Marc. January 2001 (has links)
Frankfurt (Main), Univ., Diss., 2001. / Computerdatei im Fernzugriff.
|
14 |
Trapdoor commitment schemes and their applicationsFischlin, Marc. January 2001 (has links)
Frankfurt (Main), Univ., Diss., 2001. / Computerdatei im Fernzugriff.
|
15 |
Approaches to efficient and robust cryptographic protocolsPrzydatek, Bartosz Jan. January 2007 (has links)
Diss. ETH Zürich, 2007.
|
16 |
Trapdoor commitment schemes and their applicationsFischlin, Marc. January 2001 (has links)
Frankfurt (Main), University, Diss., 2001.
|
17 |
Zur Trennung von Klassen ununterscheidbarer EnsemblesMeyer, Bernd. Unknown Date (has links) (PDF)
Universiẗat, Diss., 1995--Saarbrücken.
|
18 |
Usability challenges of PKIStraub, Tobias. Unknown Date (has links)
Techn. University, Diss., 2006--Darmstadt.
|
19 |
Contributions to provable security and efficient cryptographySchmidt-Samoa, Katja. Unknown Date (has links)
Techn. University, Diss., 2006--Darmstadt.
|
20 |
Nové přístupy v oblasti kryptologie: využití biologického materiálu / New approaches in a field of cryptology: using a biological materialJeřábková, Kamila January 2010 (has links)
Biological cryptology, a new branch of cryptology combines computer science and chemistry together. It uses biological molecules, such as DNA, RNA, PNA or proteins, or it is inspired by biological principles happening in living cells. Biological cryptology is still in the development stage, so the goal of my Master thesis is to describe existing biological cryptologic methods and to draw interest in this new field. Thus the first chapter states advantages of biological cryptology. Then three big chapters follow afterwards, describing chemical background, DNA computing and the most importantly a field of DNA cryptology. In the last chapter I summarized drawbacks which turned up while I was studying those methods and which need to be handled before biological cryptology moves from labs into our normal lives.
|
Page generated in 0.0567 seconds