Welcome, Guest.Sign in for full access to IOU Digital Library's resources.

Welcome to IOU Digital Library

Page 1 | Results on this page: 10 | Digital Books: 11 | Physical Books: 0

A generalized birthday attack

Subjects: Advances in Cryptology - EuroCrypt '88 Lecture Notes in Computer Science Volume 330 birthday attack

Published in: 101

Availability: 1 of 1(eBook)

By: Girault M.

Anonymous and verifiable registration in databases

Subjects: Advances in Cryptology - EuroCrypt '88 Lecture Notes in Computer Science Volume 330 databases and storage

Published in: 101

Availability: 1 of 1(eBook)

By: Brandt J. Damgaard I. B.

Authentication codes with multiple arbiters

Subjects: Advances in Cryptology - EuroCrypt '88 Lecture Notes in Computer Science Volume 330 authentication codes arbitration

Published in: 101

Availability: 1 of 1(eBook)

By: Brickell E. F.

Cryptanalysis of F.E.A.L.

Subjects: Advances in Cryptology - EuroCrypt '88 Lecture Notes in Computer Science Volume 330 FEAL

Published in: 101

Availability: 1 of 1(eBook)

By: den Boer B.

Efficient zero-knowledged identification scheme for smart cards

Subjects: Advances in Cryptology - EuroCrypt '88 Lecture Notes in Computer Science Volume 330 identification schemes interactive identification smart cards

Published in: 101

Availability: 1 of 1(eBook)

By: Beth T.

Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA

Subjects: Advances in Cryptology - EuroCrypt '88 Lecture Notes in Computer Science Volume 330 election schemes

Published in: 101

Availability: 1 of 1(eBook)

By: Chaum D.

Factorization of large integers on a massively parallel computer

Subjects: Advances in Cryptology - EuroCrypt '88 Lecture Notes in Computer Science Volume 330 factoring quadratic sieve

Published in: 101

Availability: 1 of 1(eBook)

By: Davis J. A.

Fast exponentiation in GF(2n)

Subjects: Advances in Cryptology - EuroCrypt '88 Lecture Notes in Computer Science Volume 330 exponentiation in GF(^{n}$)

Published in: 101

Availability: 1 of 1(eBook)

By: Agnew G. B. Mullin R. C.

Fast RSA-hardware

Subjects: Advances in Cryptology - EuroCrypt '88 Lecture Notes in Computer Science Volume 330 RSA hardware designs

Published in: 101

Availability: 1 of 1(eBook)

By: Hoornaert F. Decroos M. Vandewalle J.

Lock-in effect in cascades of clock-controlled shift-registers

Subjects: Advances in Cryptology - EuroCrypt '88 Lecture Notes in Computer Science Volume 330 clock-controlled generator cascade ciphers stream ciphers

Published in: 101

Availability: 1 of 1(eBook)

By: Chambers W. G.

Fresh Arrivals