alt text

alt text


Contact Us

alt text

Our Location

alt text

How Can We Help?


Showing 4 Results, Digital:4, Print: 0

Showing Page No. 1 , Digital:4, Print: 0

A generalized birthday attack

By Girault, M.
101., ()

Subject: Advances in Cryptology - EuroCrypt '88; Lecture Notes in Computer Science Volume 330; birthday attack
Availability: 1 of 1(eBook)
Read More

An identity-based identification scheme based on discrete logarithms modulo a composite number

By Girault, M.
101., ()

Subject: Advances in Cryptology - EuroCrypt '90; Lecture Notes in Computer Science Volume 473; discrete logarithms; modulo a composite; identity-based cryptosystems
Availability: 1 of 1(eBook)
Read More

Confirmation that some hash functions are not collision free

By Miyaguchi, S., Ohta, K.
101., ()

Subject: Advances in Cryptology - EuroCrypt '90; Lecture Notes in Computer Science Volume 473; collision intractibility; Meyer-Matyas hash function; Quisquater-Girault hash function
Availability: 1 of 1(eBook)
Read More

Hash functions using modulo-N operations

By Girault, M.
101., ()

Subject: Advances in Cryptology - EuroCrypt '87; Lecture Notes in Computer Science Volume 304; hash functions; constructions; modular arithmetic
Availability: 1 of 1(eBook)
Read More

<< Prev Next >>
                                                              
Most Viewed View All