Welcome, Guest.Sign in for full access to IOU Digital Library's resources.

Welcome to IOU Digital Library

Page 1 | Results on this page: 8 | Digital Books: 8 | Physical Books: 0

A fast correlation attack on nonlinearly feed-forward filtered shift-register sequences

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 correlation attack

Published in: 101

By: Forre R.

Detection of disrupters in the DC protocol

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 anonymity

Published in: 101

By: Bos J. N. E.

Full secure key exchange and authentication with no previously shared secrets

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 key exchange authentication

Published in: 101

By: Domingo-Ferrer J.

How to keep authenticity alive in a computer network

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 key exchange authentication local area networks

Published in: 101

By: Bauspiess F.

Fresh Arrivals