Last update: Fri Mar 23 02:19:19 MDT 2018
@Article{Henderson:1998:ALS,
author = "Marie Henderson",
title = "Applications of Linearised and Sub-linearised
Polynomials to Information Security",
journal = j-LECT-NOTES-COMP-SCI,
volume = "1438",
pages = "227--??",
year = "1998",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Feb 5 11:52:27 MST 2002",
bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t1438.htm;
http://www.math.utah.edu/pub/tex/bib/lncs1998a.bib",
URL = "http://link.springer-ny.com/link/service/series/0558/bibs/1438/14380227.htm;
http://link.springer-ny.com/link/service/series/0558/papers/1438/14380227.pdf",
acknowledgement = ack-nhfb,
}