Welcome, Guest.Sign in for full access to IOU Digital Library's resources.

Welcome to IOU Digital Library

Page 1 | Results on this page: 10 | Digital Books: 69 | Physical Books: 0

A chosen plaintext attack of the 16-round cryptosystem

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 Khufu

Published in: 101

Availability: 1 of 1(eBook)

By: Gilbert H.

A high-speed DES implementation for network applications

Subjects: Advances in Cryptology - Crypto '92 Lecture Notes in Computer Science Volume 740 Data Encryption Standard hardware implementations

Published in: 101

Availability: 1 of 1(eBook)

By: Eberle H.

Algorithms for Black-Box Fields and Their Application to Cryptography

Subjects: Advances in Cryptology - Crypto '96 Lecture Notes in Computer Science Volume 1109 relation to discrete logarithms black box fields Diffie-Hellman

Published in: 101

Availability: 1 of 1(eBook)

By: Boneh D.

An attack on the last two rounds of MD4

Subjects: Advances in Cryptology - Crypto '91 Lecture Notes in Computer Science Volume 576 MD4 hash function

Published in: 101

Availability: 1 of 1(eBook)

By: den Boer B.

An efficient existentially unforgeable signature scheme and its applications

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 digital signatures variations existentially computationally unforgeable RSA

Published in: 101

Availability: 1 of 1(eBook)

By: Dwork C.

An identity-based signature scheme with bounded life-span

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 identity-based cryptosystems

Published in: 101

Availability: 1 of 1(eBook)

By: Delos O.

An implementation of the general number field sieve

Subjects: Advances in Cryptology - Crypto '93 Lecture Notes in Computer Science Volume 773 discrete logarithms number field sieve

Published in: 101

Availability: 1 of 1(eBook)

By: Buchmann J. A. Loho J.

An l-span generalized secret sharing scheme

Subjects: Advances in Cryptology - Crypto '92 Lecture Notes in Computer Science Volume 740 secret sharing

Published in: 101

Availability: 1 of 1(eBook)

By: Harn L.

Attack on the cryptographic scheme NIKS-TAS

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 cryptanalysis

Published in: 101

Availability: 1 of 1(eBook)

By: Coppersmith D.

Attacks on the birational permutation signature schemes

Subjects: Advances in Cryptology - Crypto '93 Lecture Notes in Computer Science Volume 773 birational permutations

Published in: 101

Availability: 1 of 1(eBook)

By: Coppersmith D. Stern J.

Fresh Arrivals