Welcome, Guest.Sign in for full access to IOU Digital Library's resources.

Welcome to IOU Digital Library

Page 1 | Results on this page: 10 | Digital Books: 12 | Physical Books: 0

A generalized correlation attack with a probabilistic constrained edit distance

Subjects: Advances in Cryptology - EuroCrypt '92 Lecture Notes in Computer Science Volume 658 correlation attack

Published in: 101

Availability: 1 of 1(eBook)

By: Golic J. D.

Batch Diffie-Hellman key agreement systems and their application to portable communications

Subjects: Advances in Cryptology - EuroCrypt '92 Lecture Notes in Computer Science Volume 658 Diffie-Hellman Diffie-Hellman batch operation batch operations

Published in: 101

Availability: 1 of 1(eBook)

By: Beller M. J.

Classification of ideal homomorphic threshold schemes over finite Abelian groups (Extended abstract)

Subjects: Advances in Cryptology - EuroCrypt '92 Lecture Notes in Computer Science Volume 658 secret sharing threshold schemes

Published in: 101

Availability: 1 of 1(eBook)

By: Frankel Y.

Correlation via linear sequential circuit approximation of combiners with memory

Subjects: Advances in Cryptology - EuroCrypt '92 Lecture Notes in Computer Science Volume 658 correlation attack

Published in: 101

Availability: 1 of 1(eBook)

By: Golic J. D.

Cryptographic protocols provably secure against dynamic adversaries

Subjects: Advances in Cryptology - EuroCrypt '92 Lecture Notes in Computer Science Volume 658 proactive security

Published in: 101

Availability: 1 of 1(eBook)

By: Beaver D.

Differential cryptanalysis mod 232 with applications to MD5

Subjects: Advances in Cryptology - EuroCrypt '92 Lecture Notes in Computer Science Volume 658 differential cryptanalysis MD5 MD5 hash function

Published in: 101

Availability: 1 of 1(eBook)

By: Berson T. A.

Fast exponentiation with precomputation (Extended abstract)

Subjects: Advances in Cryptology - EuroCrypt '92 Lecture Notes in Computer Science Volume 658 exponentiation

Published in: 101

Availability: 1 of 1(eBook)

By: Brickell E. F. Gordon D. M. McCurley K. S.

FFT hashing is not collision-free

Subjects: Advances in Cryptology - EuroCrypt '92 Lecture Notes in Computer Science Volume 658 collision intractibility FFT-Hash

Published in: 101

Availability: 1 of 1(eBook)

By: Baritaud T. Gilbert H.

Graph decompositions and secret sharing schemes

Subjects: Advances in Cryptology - EuroCrypt '92 Lecture Notes in Computer Science Volume 658 secret sharing access structures

Published in: 101

Availability: 1 of 1(eBook)

By: Blundo C. De Santis A. Stinson D. R.

How to break a secure'' oblivious transfer protocol

Subjects: Advances in Cryptology - EuroCrypt '92 Lecture Notes in Computer Science Volume 658 oblivious transfer

Published in: 101

Availability: 1 of 1(eBook)

By: Beaver D.

Fresh Arrivals