Sign in
Some Applications of Bounds for Designs to the Cryptography.
Svetla Nikova
Ventzislav Nikov
Published in:
IMACC (1999)
Keyphrases
</>
upper bound
cellular automata
lower bound
upper and lower bounds
error bounds
lower and upper bounds
average case
worst case
data mining
search engine
artificial neural networks
evolutionary algorithm
information security
vc dimension
variance reduction
encryption algorithms