Cited By
View all- Rwabutaza AYang MBourbakis N(2012)A Comparative Survey on Cryptology-Based MethodologiesInternational Journal of Information Security and Privacy10.4018/jisp.20120701016:3(1-37)Online publication date: Jul-2012
- Sun HShieh S(2006)On private-key cryptosystems based on product codesInformation Security and Privacy10.1007/BFb0053722(68-79)Online publication date: 23-May-2006