Welcome, Guest.Sign in for full access to IOU Digital Library's resources.

Welcome to IOU Digital Library

Page 1 | Results on this page: 9 | Digital Books: 9 | Physical Books: 0

A cryptographic library for the Motorola DSP 56000

Subjects: Advances in Cryptology - EuroCrypt '90 Lecture Notes in Computer Science Volume 473 cryptographic coprocessors modular arithmetic Montgomery multiplication software libraries

Published in: 101

Availability: 1 of 1(eBook)

By: Dusse S. R.

All languages in NP have divertible zero-knowledge proofs and arguments under cryptographic assumptions (extended abstract)

Subjects: Advances in Cryptology - EuroCrypt '90 Lecture Notes in Computer Science Volume 473 divertible proofs divertibility zero knowledge

Published in: 101

Availability: 1 of 1(eBook)

By: Burmester M. V. D.

An identity-based identification scheme based on discrete logarithms modulo a composite number

Subjects: Advances in Cryptology - EuroCrypt '90 Lecture Notes in Computer Science Volume 473 discrete logarithms modulo a composite identity-based cryptosystems

Published in: 101

Availability: 1 of 1(eBook)

By: Girault M.

Confirmation that some hash functions are not collision free

Subjects: Advances in Cryptology - EuroCrypt '90 Lecture Notes in Computer Science Volume 473 collision intractibility Meyer-Matyas hash function Quisquater-Girault hash function

Published in: 101

Availability: 1 of 1(eBook)

By: Miyaguchi S. Ohta K.

Correlation functions of geometric sequences

Subjects: Advances in Cryptology - EuroCrypt '90 Lecture Notes in Computer Science Volume 473 boolean functions correlation attack

Published in: 101

Availability: 1 of 1(eBook)

By: Chan A. H. Goresky M.

Essentially l-fold secure authentication systems

Subjects: Advances in Cryptology - EuroCrypt '90 Lecture Notes in Computer Science Volume 473 authentication codes

Published in: 101

Availability: 1 of 1(eBook)

By: Beutelspacher A.

Experimental quantum cryptography

Subjects: Advances in Cryptology - EuroCrypt '90 Lecture Notes in Computer Science Volume 473 Experiments quantum cryptography

Published in: 101

Availability: 1 of 1(eBook)

By: Bennett C. H. Bessette F. Brassard G. Salvail L.

Inverting the pseudo exponentiation

Subjects: Advances in Cryptology - EuroCrypt '90 Lecture Notes in Computer Science Volume 473 pseudo-exponentiation

Published in: 101

Availability: 1 of 1(eBook)

By: Bauspiess F. Knobloch H.-J.

Lower bounds for the linear complexity of sequences over residue rings

Subjects: Advances in Cryptology - EuroCrypt '90 Lecture Notes in Computer Science Volume 473 linear complexity

Published in: 101

Availability: 1 of 1(eBook)

By: Dai Z. Beth T.

Fresh Arrivals