Showing 1 - 12 results of 12 for search 'Seroussi, Gadiel', query time: 0.04s
Refine Results
In addition to media from the THWS, media from other Bavarian libraries are also displayed.
These are marked with the "Interlibrary loan" label and can be ordered by clicking on them.
These are marked with the "Interlibrary loan" label and can be ordered by clicking on them.
-
1
Elliptic curves in cryptography by Blake, Ian F., Seroussi, Gadiel, Smart, Nigel P. 1967-
Published 1999Call Number: Loading…
Located: Loading… -
2
Elliptic curves in cryptography by Blake, Ian F., Seroussi, Gadiel, Smart, Nigel P. 1967-
Published 2006Call Number: Loading…Indexes
Located: Loading…
-
3
Encoding and decoding of BCH codes using light and short codewords by Roth, Ron M., Seroussi, Gadiel
Published 1987Call Number: Loading…
Located: Loading… -
4
Vector sets for exhaustive testing of logic circuits by Seroussi, Gadiel, Bshouty, Nader H.
Published 1986Call Number: Loading…
Located: Loading… -
5
Elliptic curves in cryptography by Blake, Ian F., Seroussi, Gadiel, Smart, Nigel P. 1967-
Published 2004Call Number: Loading…
Located: Loading… -
6
Elliptic curves in cryptography by Blake, Ian F., Seroussi, Gadiel, Smart, Nigel P. 1967-
Published 2001Call Number: Loading…
Located: Loading… -
7
Elliptic curves in cryptography by Blake, Ian F., Seroussi, Gadiel, Smart, Nigel P. 1967-
Published 2000Call Number: Loading…
Located: Loading… -
8
Generalizations of the normal basis theorem of finite fields by Bshouty, Nader H., Seroussi, Gadiel
Published 1989Call Number: Loading…
Located: Loading… -
9
On MDS extensions of generalized Reed-Solomon codes by Seroussi, Gadiel, Roth, Ron M.
Published 1985Call Number: Loading…
Located: Loading… -
10
On cyclic MDS codes of length q over GF(q) by Roth, Ron M., Seroussi, Gadiel
Published 1984Call Number: Loading…
Located: Loading… -
11
Maximum likelihood decoding of certain Reed-Muller codes by Seroussi, Gadiel, Lempel, Abraham
Published 1982Call Number: Loading…
Located: Loading… -
12
Advances in elliptic curve cryptography
Published 2004Other Authors:Call Number: Loading…Get full text
Located: Loading…