Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/acisp/Henderson98
%A Henderson, Marie
%B ACISP
%D 1998
%E Boyd, Colin
%E Dawson, Ed
%I Springer
%K dblp
%P 227-237
%T Applications of Linearised and Sub-linearised Polynomials to Information Security.
%U http://dblp.uni-trier.de/db/conf/acisp/acisp1998.html#Henderson98
%V 1438
%@ 3-540-64732-5
@inproceedings{conf/acisp/Henderson98,
added-at = {2017-05-23T00:00:00.000+0200},
author = {Henderson, Marie},
biburl = {https://www.bibsonomy.org/bibtex/219973e7758ce39558c569ae06aa81bf6/dblp},
booktitle = {ACISP},
crossref = {conf/acisp/1998},
editor = {Boyd, Colin and Dawson, Ed},
ee = {https://doi.org/10.1007/BFb0053736},
interhash = {8c8b05bd96474cc77ab3abd70b454b46},
intrahash = {19973e7758ce39558c569ae06aa81bf6},
isbn = {3-540-64732-5},
keywords = {dblp},
pages = {227-237},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2019-05-15T16:06:49.000+0200},
title = {Applications of Linearised and Sub-linearised Polynomials to Information Security.},
url = {http://dblp.uni-trier.de/db/conf/acisp/acisp1998.html#Henderson98},
volume = 1438,
year = 1998
}