Search

Your search keyword '"ŠVP"' showing total 395 results

Search Constraints

Start Over You searched for: Descriptor "ŠVP" Remove constraint Descriptor: "ŠVP"
395 results on '"ŠVP"'

Search Results

12. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.

18. On the SVP for low-dimensional circulant lattices.

19. Wheelchair Control Using IoT and Fall Detection Mechanism

21. Public-Key Cryptosystems and Signature Schemes from -Adic Lattices.

25. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles

27. Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors

29. Lattice Enumeration with Discrete Pruning: Improvements, Cost Estimation and Optimal Parameters.

32. Identification of MADS-Box Transcription Factors in Iris laevigata and Functional Assessment of IlSEP3 and IlSVP during Flowering.

33. Charisma in Right‐Wing Populism: Comparing the View of the Leader and Followers within the Swiss People's Party.

34. Slide Reduction, Revisited—Filling the Gaps in SVP Approximation

35. Efficient cellular and humoral immune response and production of virus-neutralizing antibodies by the Hepatitis B Virus S/preS116-42 antigen.

36. On Some Computational Problems in Local Fields.

37. Efficient cellular and humoral immune response and production of virus-neutralizing antibodies by the Hepatitis B Virus S/preS116-42 antigen

38. The imperfect fit: Fetal alcohol spectrum disorder as the basis to commit individuals involuntarily as sexually violent predators/persons.

39. Self-dual DeepBKZ for finding short lattice vectors

40. Analýza školních vzdělávacích programů přírodopisu na druhém stupni pražských základních škol

42. Random Sampling on an High-Dimensional Sphere for Solving SVP

46. FT-like paralogs are repressed by an SVP protein during the floral transition in Phalaenopsis orchid.

47. The 'Alpine region' and political change: Lessons from Bavaria and South Tyrol (1946–2018).

48. A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack

49. Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE

50. The Search Successive Minima Problem Is Equivalent to Its Optimization Version

Catalog

Books, media, physical & digital resources