Search results

(1 - 5 of 5)
Contributions to multiple comparisons procedures
Key mismatch attacks on RLWE encryption schemes
Noncommutative Grobner basis cryptosystems
On the Grundy numbers of oriented graphs
Relationships between graph polynomials