Welcome, Guest.Sign in for full access to IOU Digital Library's resources.

Welcome to IOU Digital Library

Page 1 | Results on this page: 10 | Digital Books: 14 | Physical Books: 0

A fast correlation attack on nonlinearly feed-forward filtered shift-register sequences

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 correlation attack

Published in: 101

Availability: 1 of 1(eBook)

By: Forre R.

A fast elliptic curve cryptosystem

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 efficient algorithms elliptic curve cryptosystem

Published in: 101

Availability: 1 of 1(eBook)

By: Agnew G. B. Mullin R. C.

An identity-based key-exchange protocol

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 Diffie-Hellman identity-based cryptosystems key exchange key exchange

Published in: 101

Availability: 1 of 1(eBook)

By: Guenther C. G.

Detection of disrupters in the DC protocol

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 anonymity

Published in: 101

Availability: 1 of 1(eBook)

By: Bos J. N. E.

Efficient offline electronic checks (extended abstract)

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 payment systems cut and choose electronic cash

Published in: 101

Availability: 1 of 1(eBook)

By: Chaum D. den Boer B. van Heyst E. Mjoelsnes S. F.

Everything in NP can be argued in perfect zero-knowledge in a bounded number of rounds (extended abstract)

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 zero knowledge perfect zero knowledge

Published in: 101

Availability: 1 of 1(eBook)

By: Brassard G. Cr'epeau C.

Faster primality testing (extended abstract)

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 primality testing

Published in: 101

Availability: 1 of 1(eBook)

By: Bosma W.

Feedforward functions defined by de Brujin sequences

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 linear complexity de Bruijn sequences

Published in: 101

Availability: 1 of 1(eBook)

By: Dai Z.

Full secure key exchange and authentication with no previously shared secrets

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 key exchange authentication

Published in: 101

Availability: 1 of 1(eBook)

By: Domingo-Ferrer J.

Fresh Arrivals