Efficient Public Auction with One-Time Registration and Public Verifiability
Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma
|
Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator
Alexander Kholosha
|
Cryptographic Functions and Design Criteria for Block Ciphers
Anne Canteaut
|
Cryptographic Primitives for Information Authentication — State of the Art
Bart Preneel
|
Spatial Domain Digital Watermarking with Buyer Authentication
Subhamoy Maitra, Dipti Prasad Mukherjee
|
Trends in the Fight Against Computer-Related Delinquency
Bart De Schutter
|
Security Management – The Process
David W. Roberts
|
On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices
Maria Fedorova, Yuriy Tarannikov
|
Cryptanalysis of the Nonlinear FeedForward Generator
S.S. Bedi, N. Rajesh Pillai
|
Fast Generation of Cubic Irreducible Polynomials for XTR
Jae Moon Kim, Ikkwon Yie, Seung Ik Oh, Hyung Don Kim, and Jado Ryu
|
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
Markus Maurer, Alfred Menezes, Edlyn Teske
|
Linear Authentication Codes: Bounds and Constructions
Rei Safavi-Naini , Huaxiong Wang, Chaoping Xing
|
Security Aspects of the Ecash TM Payment System
Berry Schoenmakers
|
Cheating Prevention in Secret Sharing over GF(p t )
Josef Pieprzyk, Xian-Mo Zhang
|
International Standardisation of IT Security
Klaus Vedder
|
Efficient Software Implementation of Linear Feedback Shift Registers
Sandeepan Chowdhury, Subhamoy Maitra
|
A New Anonymous Fingerprinting Scheme with High Enciphering Rate
Minoru Kuribayashi, Hatsukazu Tanaka
|
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography
Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica
|
Mobile Agent Route Protection through Hash-Based Mechanisms
Josep Domingo-Ferrer
|
TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View
Peter Landrock
|