Matches in DBpedia 2016-04 for { <http://citation.dbpedia.org/hash/bfb81ce938606f5f6f2666f308789e40e4135627c6b0654b484a603a24f68d51> ?p ?o }
Showing triples 1 to 8 of
8
with 100 triples per page.
- bfb81ce938606f5f6f2666f308789e40e4135627c6b0654b484a603a24f68d51 author2 "Eli Biham".
- bfb81ce938606f5f6f2666f308789e40e4135627c6b0654b484a603a24f68d51 first "Elad".
- bfb81ce938606f5f6f2666f308789e40e4135627c6b0654b484a603a24f68d51 isCitedBy 1.
- bfb81ce938606f5f6f2666f308789e40e4135627c6b0654b484a603a24f68d51 journal "Selected Areas in Cryptography 2005".
- bfb81ce938606f5f6f2666f308789e40e4135627c6b0654b484a603a24f68d51 last "Barkan".
- bfb81ce938606f5f6f2666f308789e40e4135627c6b0654b484a603a24f68d51 pages "1–19".
- bfb81ce938606f5f6f2666f308789e40e4135627c6b0654b484a603a24f68d51 title "Conditional Estimators: An Effective Attack on A5/1".
- bfb81ce938606f5f6f2666f308789e40e4135627c6b0654b484a603a24f68d51 year "2005".