Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography
Harald Baier
Robust and Secure Broadcasting
Yi Mu, Vijay Varadharajan
Elliptic Curve Public-Key Cryptosystems — An Introduction
Erik De Win và Bart Preneel
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography
Li Shujun, Mou Xuanqin, Cai Yuanlong
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001
Seongan Lim , Seungjoo Kim , Ikkwon Yie ,Jaemoon Kim
Efficient “on the Fly” Signature Schemes Based on Integer Factoring
Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji
Recent Developments in the Design of Conventional Cryptographic Algorithms
Bart Preneel, Vincent Rijmen, và Antoon Bosselaers
Multiples of Primitive Polynomials over GF(2)
Kishan Chand Gupta, Subhamoy Maitra
Selective Receipt in Certified E-mail
Steve Kremer, Olivier Markowitch
A Twin Algorithm for Efficient Generation of Digital Signatures
D. Ramesh
Re-dividing Complexity between Algorithms and Keys
Gideon Samid
An Application of Sieve Methods to Elliptic Curves
S. Ali Miri, V. Kumar Murty
Key Management Techniques
Walter Fumy
Frameproof and IPP Codes
Palash Sarkar, Douglas R. Stinson
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining
Bok-Min Goi, M.U. Siddiqi, Hean-Teik Chuah
Management of Secret Keys: Dynamic Key Handling
Joan Daemen
Smart Card Security ‘How Can We Be So Sure?’
Ernst Bovelander
Introduction to Computer Security
Bart De Decker
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem
Amr Youssef, Guang Gong
Autocorrelation Properties of Correlation Immune Boolean Functions
Subhamoy Maitra

Chuyên trang

Tìm kiếm bài báo