Buscas alternativas:
encryption algorithm » extraction algorithm (Expandir a busca), consumption algorithm (Expandir a busca), evolution algorithm (Expandir a busca)
based encryption » data encryption (Expandir a busca), rsa encryption (Expandir a busca), image encryption (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
function based » functions based (Expandir a busca), function cases (Expandir a busca), sanction based (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
encryption algorithm » extraction algorithm (Expandir a busca), consumption algorithm (Expandir a busca), evolution algorithm (Expandir a busca)
based encryption » data encryption (Expandir a busca), rsa encryption (Expandir a busca), image encryption (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
function based » functions based (Expandir a busca), function cases (Expandir a busca), sanction based (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
1
“... search for a post-quantum and homomorphic algorithm based on such graphs. In 2011, Jao and De Feo...”
Cryptographic algorithms based on Ramanujan graphs
Tese