A Parallel Algorithm for Extending Cryptographic Hash Functions
Palash Sarkar, Paul J. Schellenberg |
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function
Eike Kiltz |
Toward Optimal Player Weights in Secure Distributed Protocols
K. Srinathan, C. Pandu Rangan, V. Kamakoti |
GSM: Security, Services, and the SIM
Klaus Vedder |
An Analysis of Integrity Services in Protocols
Kapali Viswanathan, Colin Boyd, Ed Dawson |
Security of Computer Networks
Jan Verschuren |
Internet Security Protocols
Walter Fumy |
Block Ciphers — A Survey
Lars R. Knudsen |
Securing Internet Electronic Mail
Mark Vandenwauver, Frank Jorissen |
Smart Cards – Requirements, Properties, and Applications
Klaus Vedder, Franz Weikmann |
On Solutions to the Key Escrow Problem
Mark P. Hoyle, Chris J. Mitchell |
Chuyên trang
Tìm kiếm bài báo