Cryptographie Algorithmes. TI Techniques de l'Ingénieur.
Paper bibtex @article{
title = {Cryptographie Algorithmes},
type = {article},
pages = {1-16},
id = {8587baa6-c876-3fb0-8817-449d0948dd94},
created = {2011-12-15T13:46:46.000Z},
file_attached = {true},
profile_id = {181202e9-9e14-3446-b699-8df37a3580b5},
group_id = {36e61195-3063-323c-b879-d6d31394db8a},
last_modified = {2017-03-14T14:39:23.619Z},
tags = {Mathématiques},
read = {true},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {TIbax},
folder_uuids = {d10a704f-f298-425b-99b3-9752b6438360},
private_publication = {false},
bibtype = {article},
author = {TI, undefined},
journal = {Techniques de l'Ingénieur}
}
Downloads: 0
{"_id":"hxfECCG9xAwCSeLn4","bibbaseid":"ti-cryptographiealgorithmes","downloads":0,"creationDate":"2017-10-18T08:27:05.714Z","title":"Cryptographie Algorithmes","author_short":["TI"],"year":null,"bibtype":"article","biburl":null,"bibdata":{"title":"Cryptographie Algorithmes","type":"article","pages":"1-16","id":"8587baa6-c876-3fb0-8817-449d0948dd94","created":"2011-12-15T13:46:46.000Z","file_attached":"true","profile_id":"181202e9-9e14-3446-b699-8df37a3580b5","group_id":"36e61195-3063-323c-b879-d6d31394db8a","last_modified":"2017-03-14T14:39:23.619Z","tags":"Mathématiques","read":"true","starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"TIbax","folder_uuids":"d10a704f-f298-425b-99b3-9752b6438360","private_publication":false,"bibtype":"article","author":"TI, undefined","journal":"Techniques de l'Ingénieur","bibtex":"@article{\n title = {Cryptographie Algorithmes},\n type = {article},\n pages = {1-16},\n id = {8587baa6-c876-3fb0-8817-449d0948dd94},\n created = {2011-12-15T13:46:46.000Z},\n file_attached = {true},\n profile_id = {181202e9-9e14-3446-b699-8df37a3580b5},\n group_id = {36e61195-3063-323c-b879-d6d31394db8a},\n last_modified = {2017-03-14T14:39:23.619Z},\n tags = {Mathématiques},\n read = {true},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {TIbax},\n folder_uuids = {d10a704f-f298-425b-99b3-9752b6438360},\n private_publication = {false},\n bibtype = {article},\n author = {TI, undefined},\n journal = {Techniques de l'Ingénieur}\n}","author_short":["TI"],"urls":{"Paper":"https://bibbase.org/service/mendeley/25bd5b32-29aa-37df-a206-ab5dc511be68/file/46bd1b17-d8f4-0649-24c8-d901d3234acd/Cryptographie_Algorithmes.pdf.pdf"},"bibbaseid":"ti-cryptographiealgorithmes","role":"author","downloads":0,"html":""},"search_terms":["cryptographie","algorithmes","ti"],"keywords":[],"authorIDs":[]}