Academic literature on the topic 'Crypto analysis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Crypto analysis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Crypto analysis"

1

Rouhani, Saeed, and Ehsan Abedin. "Crypto-currencies narrated on tweets: a sentiment analysis approach." International Journal of Ethics and Systems 36, no. 1 (2019): 58–72. http://dx.doi.org/10.1108/ijoes-12-2018-0185.

Full text
Abstract:
Purpose Crypto-currencies, decentralized electronic currencies systems, denote a radical change in financial exchange and economy environment. Consequently, it would be attractive for designers and policy-makers in this area to make out what social media users think about them on Twitter. The purpose of this study is to investigate the social opinions about different kinds of crypto-currencies and tune the best-customized classification technique to categorize the tweets based on sentiments. Design/methodology/approach This paper utilized a lexicon-based approach for analyzing the reviews on a
APA, Harvard, Vancouver, ISO, and other styles
2

MAGOMEDOV, RAMAZAN M. "CRYPTO VOLT MARKET ANALYSIS. BITCOINS." INTERNATIONAL SCIENTIFIC JOURNAL, no. 3 (2020): 81–86. http://dx.doi.org/10.34286/1995-4638-2020-72-3-81-86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kanarachos, A., and Ch Provatidis. "Crypto-DOF finite elements." International Journal for Numerical Methods in Engineering 28, no. 4 (1989): 943–54. http://dx.doi.org/10.1002/nme.1620280415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gurrib, Ikhlaas. "Can energy commodities affect energy blockchain-based cryptos?" Studies in Economics and Finance 36, no. 4 (2019): 682–99. http://dx.doi.org/10.1108/sef-10-2018-0313.

Full text
Abstract:
Purpose The purpose of this paper is to shed fresh light into whether an energy commodity price index (ENFX) and energy blockchain-based crypto price index (ENCX) can be used to predict movements in the energy commodity and energy crypto market. Design/methodology/approach Using principal component analysis over daily data of crude oil, heating oil, natural gas and energy based cryptos, the ENFX and ENCX indices are constructed, where ENFX (ENCX) represents 94% (88%) of variability in energy commodity (energy crypto) prices. Findings Natural gas price movements were better explained by ENCX, a
APA, Harvard, Vancouver, ISO, and other styles
5

Vaz de Melo Mendes, Beatriz, and André Fluminense Carneiro. "A Comprehensive Statistical Analysis of the Six Major Crypto-Currencies from August 2015 through June 2020." Journal of Risk and Financial Management 13, no. 9 (2020): 192. http://dx.doi.org/10.3390/jrfm13090192.

Full text
Abstract:
After more than a decade of existence, crypto-currencies may now be considered an important class of assets presenting some unique appealing characteristics but also sharing some features with real financial assets. This paper provides a comprehensive statistical analysis of the six most important crypto-currencies from the period 2015–2020. Using daily data we (1) showed that the returns present many of the stylized facts often observed for stock assets, (2) modeled the returns underlying distribution using a semi-parametric mixture model based on the extreme value theory, (3) showed that the
APA, Harvard, Vancouver, ISO, and other styles
6

Babynjuk, Olexandra, Alla Nahirna, and Olexandra Nahorna. "Lucifer encrypt algorithm and its crypto analysis." Modeling and Information Systems in Economics, no. 98 (November 28, 2019): 13–24. http://dx.doi.org/10.33111/mise.98.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Kyungroul, Insu Oh, Sun-Young Lee, and Kangbin Yim. "Vulnerability Analysis on the CNG Crypto Library." Journal of Korean Institute of Communications and Information Sciences 42, no. 4 (2017): 838–47. http://dx.doi.org/10.7840/kics.2017.42.4.838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Conrady, Beate, Michael Brunauer, and Franz-Ferdinand Roch. "Cryptosporidium spp. Infections in Combination with Other Enteric Pathogens in the Global Calf Population." Animals 11, no. 6 (2021): 1786. http://dx.doi.org/10.3390/ani11061786.

Full text
Abstract:
The most common worldwide diarrhoea-causing agents in neonatal calves are Cryptosporidium spp. (Crypto), bovine rotavirus (BRV), bovine coronavirus (BCoV), and enterotoxigenic Escherichia coli F5 (K99) (ETEC). Crypto is a zoonotic pathogen of diarrhoea in humans, particularly for children and immunocompromised adults. Four weighted-stratified random-effect meta-analyses including meta-regression analyses were performed to calculate the worldwide mean prevalence of Crypto and associated concurrent infections with BRV, BCoV and ETEC, as well as their potential influencing factors. The meta-analy
APA, Harvard, Vancouver, ISO, and other styles
9

Brunauer, Michael, Franz-Ferdinand Roch, and Beate Conrady. "Prevalence of Worldwide Neonatal Calf Diarrhoea Caused by Bovine Rotavirus in Combination with Bovine Coronavirus, Escherichia coli K99 and Cryptosporidium spp.: A Meta-Analysis." Animals 11, no. 4 (2021): 1014. http://dx.doi.org/10.3390/ani11041014.

Full text
Abstract:
Multiple enteropathogens such as bovine rotavirus (BRV), bovine coronavirus (BCoV), Escherichia coli K99 (ETEC) and Cryptosporidium spp. (Crypto) are the most common causes of calf diarrhoea during the first 30 days of animal age. Three weighted-stratified random-effects meta-analyses were performed to calculate the worldwide prevalence of mixed infections of the causative agents (i.e., BRV-BCoV, BRV-ETEC, BRV-Crypto) and their potential influencing factors. The meta-analysis covered 41 studies (94 sub-studies) in 21 countries that determined the presence or absence of mixed infections in glob
APA, Harvard, Vancouver, ISO, and other styles
10

Arias-Oliva, Mario, Jorge de Andrés-Sánchez, and Jorge Pelegrín-Borondo. "Fuzzy Set Qualitative Comparative Analysis of Factors Influencing the Use of Cryptocurrencies in Spanish Households." Mathematics 9, no. 4 (2021): 324. http://dx.doi.org/10.3390/math9040324.

Full text
Abstract:
This paper assesses the variables influencing the expansion of cryptocurrency (crypto for short) use in households. To carry on the study we apply a consumer-behavior focus and so-called fuzzy set Qualitative Comparative Analysis (fsQCA). In a previous research, that was grounded on Unified Theory of Acceptance and Use of Technology (UTAUT) and Partial Least Squares (PLS), we found that main factors to explain the intention to use of cryptos by individuals were performance expectancy (in fact, it was the main factor), effort expectancy and facilitating conditions. We did not found evidences ab
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Crypto analysis"

1

Hillerup, Jens Christian. "Crypto analysis and its applications to password hashing." Thesis, KTH, Kommunikationssystem, CoS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142651.

Full text
Abstract:
Hash functions are a type of mathematical function that takes an input of arbitrary length and gives an output of fixed length, called a hash value. Many consider hash values to be sort of a “fingerprint” of some data, since they can be assumed to have unique outputs for any possible input. This assumption does not make a lot of sense, because the size of the input space is infinite while the size of the output space remains finite! It is, nevertheless, defensible because of the infeasibility of finding two inputs that yield the same hash value. Hash functions are often used to store passwords
APA, Harvard, Vancouver, ISO, and other styles
2

Kannavara, Raghudeep. "DESIGN AND PERFORMANCE ANALYSIS OF A SECURE PROCES-SOR SCAN-SP WITH CRYPTO-BIOMETRIC CAPABILITIES." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1254532768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nyarugwe, Raymond Tendai. "An analysis of the Zimbabwean money laundering and proceeds of crime amendment act of 2018." University of Western Cape, 2020. http://hdl.handle.net/11394/8057.

Full text
Abstract:
Magister Legum - LLM<br>Financial crimes are transnational in nature, and no country is immune from them. They are an international problem that can best be solved through international cooperation on a global scale. It is therefore necessary to have rules and norms that apply worldwide in order to deal with these crimes comprehensively.1 Of particular prominence is the crime of money laundering (ML), which may be defined as the processing of criminal proceeds to disguise their illegal origin.2 This term is relatively new and is broadly defined, with the definitions varying from jurisdiction t
APA, Harvard, Vancouver, ISO, and other styles
4

Valinčius, Tomas. "Programinės įrangos ir duomenų saugumas: grėsmės ir jų valdymas, šifravimo algoritmai." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080811_151738-05648.

Full text
Abstract:
Darbo tikslas – išnagrinėti būdus darbo kompiuteriu keliamoms grėsmėms valdyti: (1) Aptarti, pažinti grėsmes kompiuterinių sistemų saugumui; (2) Suprasti, kas sukelia šias grėsmes, nagrinėjant programinės įrangos kūrimo procesą; (3) Nustatyti būdus, kurie gali sumažinti ar eliminuoti grėsmes. Darbe pirmiausiai aptariamos techninės priežastys, lemiančios saugumo spragų programinėje įrangoje pasirodymą; piktavališkų programų tipai bei jų daroma žala. Toliau aptarti šiuo metu naudojami metodai programinės įrangos saugumui ir kokybei užtikrinti, suformuluoti pagrindiniai saugios programinės įrango
APA, Harvard, Vancouver, ISO, and other styles
5

Ringmann, Björn, and Peter Hildeblom. "Minnet sviker Aldrig : Att utnyttja volatil data i Krypterade system." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-26424.

Full text
Abstract:
When the use of encryption amongst the regular computer user grows morewidespread than ever it makes the life of the IT-forensics experts difficult.Hampering the judicial investigations that otherwise could have lead to convictions. In this report we will treat the subject of crypto analysis with a focus on decrypting files and devices encrypted with the software TrueCrypt. A solution will be presented that can facilitate the future work involving encryption. The application DFEAT that has been developed during the writings of this report is faster than the corresponding software EFDD, and att
APA, Harvard, Vancouver, ISO, and other styles
6

Daněček, Petr. "Útoky na kryptografické moduly." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-233418.

Full text
Abstract:
The conventional way of cryptanalysis is based on the cryptographic algorithms weak points examine. The attack model of conventional cryptanalysis covers mathematical description of the cryptographic algorithm used. This model is not with the relation to the physical model implementation and the real environment. Cryptographic algorithms currently used in the combination with strong cipher keys are almost unbreakable and the conventional cryptanalysis is ineffective. The new way of cryptanalysis employs the side channels. The model of cryptanalysis using side channels is enhanced with physical
APA, Harvard, Vancouver, ISO, and other styles
7

Ritchie, Justine Marie. "Methods for statistical analysis of colonic crypt labelling." Diss., The University of Arizona, 1994. http://hdl.handle.net/10150/186850.

Full text
Abstract:
In cancer prevention research, intermediate markers are often used. In colon cancer one such biomarker is the colon crypt labelling index which attempts to measure the proliferation rate for colon tissue. Another suggested biomarker is an upward shift in the location of cell proliferation occurring in the crypt columns. For each person on study, there a varying number of crypt columns available to study the biomarkers, where each crypt column contains on average sixty epithelial cells. The information available for each crypt column is an ordered sequence of zeroes and ones where a one indicat
APA, Harvard, Vancouver, ISO, and other styles
8

Nelson, Martin. "Biomechanical modelling of colorectal crypt formation and in-vitro replication." Thesis, University of Nottingham, 2011. http://eprints.nottingham.ac.uk/11778/.

Full text
Abstract:
The colon's epithelial lining exhibits a number of invaginations into the underlying tissue, called the crypts of Lieberkühn. Housing stem cells at their bases, these crypts play an essential role in the maintenance of the epithelium; however, the processes by which crypts form are not conclusively understood. This study deploys mathematical and experimental modelling to validate one potential mechanism: that cellular growth in the developing epithelium causes a build up of compressive stresses, resulting in buckling instabilities which initiate crypt formation. We begin with an extension to t
APA, Harvard, Vancouver, ISO, and other styles
9

Korada, Anu. "3D analysis of mandibular deciduous tooth crypts using μCT imaging". Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/58910.

Full text
Abstract:
Objectives: Interactions between the dental follicle and the alveolar bone are tightly coordinated such that the correct amount of support for each tooth is formed. Prior to root formation, bone-tooth interactions may also regulate the shape or size of the crown. Here we measure the increase in tooth and mandibular volume and then go onto to determine whether growth of each crypt is allometric or isometric. Finally we determine whether tooth shape is influenced by local factors. Methods: Fetal heads 12 to 19 weeks were obtained from BC Women’s hospital (N = 25; Protocol H08-02576). Heads were
APA, Harvard, Vancouver, ISO, and other styles
10

Malm, Victor, and Tobias Bjurhall. "Virtuella valutor : riskanalys av nya betalningsmedel." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-556.

Full text
Abstract:
Historien om betalningsmedel vänder under 2010-talet blad och börjar på ett nyttkapitel. Nästa steg i den monetära utvecklingen sker när de virtuella valutorna ökar ianvändning. Den virtuella valutan Bitcoin introducerades av Satoshi Nakamato år2009 och är en digital valuta, vilket innebär att den inte är kopplad till någon fysisktillgång med rättslig innebörd. När ett nytt betalningsmedel introduceras ärfundamentala faktorer gällande samhällets acceptans och nyttjande ett ekonomisktpussel. Hur kommer det sig att individer byter verkliga varor mot en papperssedel, ettmynt eller en elektronisk
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Crypto analysis"

1

Bamikunle, Aderemi James. Introduction to Soyinka's poetry: Analysis of A shuttle in the crypt. Ahmadu Bello University Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

service), ScienceDirect (Online. Cryo-EM: Analyses, interpretation, and case studies. Academic Press/Elsevier, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Holden, Matthew T. G. Molecular genetic analysis of cryptic antibiotic genes in Erwinia Carotovora subsp. Carotovora. typescript, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cryo-EM, Part C: Analyses, Interpretation, and Case studies. Elsevier, 2010. http://dx.doi.org/10.1016/c2010-0-66530-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ltd, ICON Group. CRYO: Labor Productivity Benchmarks and International Gap Analysis (Labor Productivity Series). 2nd ed. Icon Group International, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ltd, ICON Group. CRYO: International Competitive Benchmarks and Financial Gap Analysis (Financial Performance Series). 2nd ed. Icon Group International, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ltd, ICON Group. CRYO INTERACTIVE ENTERTAINMENT SA: International Competitive Benchmarks and Financial Gap Analysis (Financial Performance Series). 2nd ed. Icon Group International, Inc., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ltd, ICON Group. CRYO-CELL INTERNATIONAL, INC.: Labor Productivity Benchmarks and International Gap Analysis (Labor Productivity Series). 2nd ed. Icon Group International, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ltd, ICON Group. CRYO-CELL INTERNATIONAL, INC.: International Competitive Benchmarks and Financial Gap Analysis (Financial Performance Series). 2nd ed. Icon Group International, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ltd, ICON Group. CRYO INTERACTIVE ENTERTAINMENT SA: Labor Productivity Benchmarks and International Gap Analysis (Labor Productivity Series). 2nd ed. Icon Group International, Inc., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Crypto analysis"

1

Popuri, Manoj Kumar, and Mehmet Hadi Gunes. "Empirical Analysis of Crypto Currencies." In Studies in Computational Intelligence. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30569-1_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kocher, Paul, Joshua Jaffe, and Benjamin Jun. "Differential Power Analysis." In Advances in Cryptology — CRYPTO’ 99. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48405-1_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Goyal, Parth S., Akshat Kakkar, Gopika Vinod, and Gigi Joseph. "Crypto-Ransomware Detection Using Behavioural Analysis." In Reliability, Safety and Hazard Assessment for Risk-Based Technologies. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9008-1_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barbosa, Manuel, Alexandra Boldyreva, Shan Chen, and Bogdan Warinschi. "Provable Security Analysis of FIDO2." In Advances in Cryptology – CRYPTO 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84252-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hoang, Viet Tung, and Yaobin Shen. "Security Analysis of NIST CTR-DRBG." In Advances in Cryptology – CRYPTO 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-56784-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Golić, Jovan D. "Correlation Analysis of the Shrinking Generator." In Advances in Cryptology — CRYPTO 2001. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44647-8_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Taguchi, Wataru, and Kazumasa Omote. "Risk Analysis for Worthless Crypto Asset Networks." In Advanced Information Networking and Applications. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75075-6_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Biham, Eli, and Adi Shamir. "Differential fault analysis of secret key cryptosystems." In Advances in Cryptology — CRYPTO '97. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0052259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nguyen, Phong Q., and David Pointcheval. "Analysis and Improvements of NTRU Encryption Paddings." In Advances in Cryptology — CRYPTO 2002. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45708-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Hyung Tae, and Jae Hong Seo. "Security Analysis of Multilinear Maps over the Integers." In Advances in Cryptology – CRYPTO 2014. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44371-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Crypto analysis"

1

Lee, Kyungroul, Ilsun You, and Kangbin Yim. "Vulnerability Analysis on the CNG Crypto Library." In 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2015. http://dx.doi.org/10.1109/imis.2015.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bistarelli, Stefano, Ivan Mercanti, and Francesco Santini. "An Analysis of Non-standard Bitcoin Transactions." In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, 2018. http://dx.doi.org/10.1109/cvcbt.2018.00016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sun, Yujing, Hao Xiong, Siu Ming Yiu, and Kwok Yan Lam. "BitVis: An Interactive Visualization System for Bitcoin Accounts Analysis." In 2019 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, 2019. http://dx.doi.org/10.1109/cvcbt.2019.000-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lingxiao Wei, Jie Zhang, Feng Yuan, Yannan Liu, Junfeng Fan, and Qiang Xu. "Vulnerability analysis for crypto devices against probing attack." In 2015 20th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, 2015. http://dx.doi.org/10.1109/aspdac.2015.7059113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kizhvatov, Ilya. "Side channel analysis of AVR XMEGA crypto engine." In the 4th Workshop. ACM Press, 2009. http://dx.doi.org/10.1145/1631716.1631724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

KARA, Ilker, and Murat AYDOS. "Cyber Fraud: Detection and Analysis of the Crypto-Ransomware." In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2020. http://dx.doi.org/10.1109/uemcon51285.2020.9298128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bhat, Meenakshi, and Shafalika Vijayal. "A Probabilistic Analysis on Crypto-Currencies Based on Blockchain." In 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS). IEEE, 2017. http://dx.doi.org/10.1109/icngcis.2017.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

El-Hadedy, Mohamed, and Kevin Skadron. "Hardware overhead analysis of programmability in ARX crypto processing." In ISCA '15: The 42nd Annual International Symposium on Computer Architecture. ACM, 2015. http://dx.doi.org/10.1145/2768566.2768574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Han, Runchao, Nikos Foutris, and Christos Kotselidis. "Demystifying Crypto-Mining: Analysis and Optimizations of Memory-Hard PoW Algorithms." In 2019 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). IEEE, 2019. http://dx.doi.org/10.1109/ispass.2019.00011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

KURD, Abdulsamad, and Nurettin BESLI. "Analysis of the Cryptography Methods for Design of Crypto-Processor." In 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). IEEE, 2020. http://dx.doi.org/10.1109/hora49412.2020.9152929.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Crypto analysis"

1

Clark, D. D0 Cryo-Corner Piping Flexibility Analysis. Office of Scientific and Technical Information (OSTI), 1991. http://dx.doi.org/10.2172/1031760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!