Archives - Page 7
-
PB-449 The breaking of the AR Hash Function
No. 449 (1993) -
Pb-447 Finiteness Conditions for Strictness Analysis
No. 447 (1993) -
PB-440 Cryptanalysis of LOKI91
No. 440 (1993) -
PB-441 Iterative Algorithms for Fixed Point Computation
No. 441 (1993) -
PB-438 Dynamic Word problems
No. 438 (1993) -
PB-439 Iterative Characteristics of DES and S^2-DES
No. 439 (1993) -
PB-435 Completeness Results for Linear Logic on Petri Nets
No. 435 (1993) -
PB-490 A pictorial illustration of conventional cryptography
No. 490 (1994) -
PB-433 From CML to process Algebras
No. 433 (1993) -
PB-434 High Level Efficiency in Database Languages
No. 434 (1993) -
PB-428 AVL Trees With Relaxed Balance
No. 428 (1992) -
PB-429 Models for Concurrency
No. 429 (1992) -
PB-427 The Correctness of an Optimized Code Generation
No. 427 (1992)