Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography
Harald Baier
|
Robust and Secure Broadcasting
Yi Mu, Vijay Varadharajan
|
Elliptic Curve Public-Key Cryptosystems — An Introduction
Erik De Win và Bart Preneel
|
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography
Li Shujun, Mou Xuanqin, Cai Yuanlong
|
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001
Seongan Lim , Seungjoo Kim , Ikkwon Yie ,Jaemoon Kim
|
Efficient “on the Fly” Signature Schemes Based on Integer Factoring
Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji
|
Recent Developments in the Design of Conventional Cryptographic Algorithms
Bart Preneel, Vincent Rijmen, và Antoon Bosselaers
|
Multiples of Primitive Polynomials over GF(2)
Kishan Chand Gupta, Subhamoy Maitra
|
Selective Receipt in Certified E-mail
Steve Kremer, Olivier Markowitch
|
A Twin Algorithm for Efficient Generation of Digital Signatures
D. Ramesh
|
Re-dividing Complexity between Algorithms and Keys
Gideon Samid
|
An Application of Sieve Methods to Elliptic Curves
S. Ali Miri, V. Kumar Murty
|
Key Management Techniques
Walter Fumy
|
Frameproof and IPP Codes
Palash Sarkar, Douglas R. Stinson
|
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining
Bok-Min Goi, M.U. Siddiqi, Hean-Teik Chuah
|
Management of Secret Keys: Dynamic Key Handling
Joan Daemen
|
Smart Card Security ‘How Can We Be So Sure?’
Ernst Bovelander
|
Introduction to Computer Security
Bart De Decker
|
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem
Amr Youssef, Guang Gong
|
Autocorrelation Properties of Correlation Immune Boolean Functions
Subhamoy Maitra
|