Efficient Public Auction with One-Time Registration and Public Verifiability
Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma
Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator
Alexander Kholosha
Cryptographic Functions and Design Criteria for Block Ciphers
Anne Canteaut
Cryptographic Primitives for Information Authentication — State of the Art
Bart Preneel
Spatial Domain Digital Watermarking with Buyer Authentication
Subhamoy Maitra, Dipti Prasad Mukherjee
Trends in the Fight Against Computer-Related Delinquency
Bart De Schutter
Security Management – The Process
David W. Roberts
On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices
Maria Fedorova, Yuriy Tarannikov
Cryptanalysis of the Nonlinear FeedForward Generator
S.S. Bedi, N. Rajesh Pillai
Fast Generation of Cubic Irreducible Polynomials for XTR
Jae Moon Kim, Ikkwon Yie, Seung Ik Oh, Hyung Don Kim, and Jado Ryu
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
Markus Maurer, Alfred Menezes, Edlyn Teske
Linear Authentication Codes: Bounds and Constructions
Rei Safavi-Naini , Huaxiong Wang, Chaoping Xing
Security Aspects of the Ecash TM Payment System
Berry Schoenmakers
Cheating Prevention in Secret Sharing over GF(p t )
Josef Pieprzyk, Xian-Mo Zhang
International Standardisation of IT Security
Klaus Vedder
Efficient Software Implementation of Linear Feedback Shift Registers
Sandeepan Chowdhury, Subhamoy Maitra
A New Anonymous Fingerprinting Scheme with High Enciphering Rate
Minoru Kuribayashi, Hatsukazu Tanaka
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography
Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica
Mobile Agent Route Protection through Hash-Based Mechanisms
Josep Domingo-Ferrer
TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View
Peter Landrock

Chuyên trang

Tìm kiếm bài báo