|
A Parallel Algorithm for Extending Cryptographic Hash Functions
Palash Sarkar, Paul J. Schellenberg |
|
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function
Eike Kiltz |
|
Toward Optimal Player Weights in Secure Distributed Protocols
K. Srinathan, C. Pandu Rangan, V. Kamakoti |
|
GSM: Security, Services, and the SIM
Klaus Vedder |
|
An Analysis of Integrity Services in Protocols
Kapali Viswanathan, Colin Boyd, Ed Dawson |
|
Security of Computer Networks
Jan Verschuren |
|
Internet Security Protocols
Walter Fumy |
|
Block Ciphers — A Survey
Lars R. Knudsen |
|
Securing Internet Electronic Mail
Mark Vandenwauver, Frank Jorissen |
|
Smart Cards – Requirements, Properties, and Applications
Klaus Vedder, Franz Weikmann |
|
On Solutions to the Key Escrow Problem
Mark P. Hoyle, Chris J. Mitchell |
Chuyên trang
Tìm kiếm bài báo
