Welcome, Guest.Sign in for full access to IOU Digital Library's resources.

Welcome to IOU Digital Library

Page 1 | Results on this page: 9 | Digital Books: 9 | Physical Books: 0

Blind synchronization of m-sequences with even span

Subjects: Advances in Cryptology - EuroCrypt '93 Lecture Notes in Computer Science Volume 765 stream ciphers synchronization

Published in: 101

Availability: 1 of 1(eBook)

By: Games R. A.

Boolean functions satisfying a higher order strict avalanche criterion

Subjects: Advances in Cryptology - EuroCrypt '93 Lecture Notes in Computer Science Volume 765 avalanche criterion

Published in: 101

Availability: 1 of 1(eBook)

By: Cusick T. W.

Collisions for the compression function of MD-5

Subjects: Advances in Cryptology - EuroCrypt '93 Lecture Notes in Computer Science Volume 765 MD4 hash function

Published in: 101

Availability: 1 of 1(eBook)

By: den Boer B.

Cryptanalysis of the Chang-Wu-Chen key distribution system

Subjects: Advances in Cryptology - EuroCrypt '93 Lecture Notes in Computer Science Volume 765 conference key distribution

Published in: 101

Availability: 1 of 1(eBook)

By: Burmester M. V. D.

Distance bounding protocols

Subjects: Advances in Cryptology - EuroCrypt '93 Lecture Notes in Computer Science Volume 765 distance bounding

Published in: 101

Availability: 1 of 1(eBook)

By: Brands S.

Factoring integers using SIMD sieves

Subjects: Advances in Cryptology - EuroCrypt '93 Lecture Notes in Computer Science Volume 765 factoring quadratic sieve

Published in: 101

Availability: 1 of 1(eBook)

By: Dixon B.

Global, unpredictable bit generation without broadcast

Subjects: Advances in Cryptology - EuroCrypt '93 Lecture Notes in Computer Science Volume 765 broadcast encryption

Published in: 101

Availability: 1 of 1(eBook)

By: Beaver D.

Improved privacy in wallets with observers

Subjects: Advances in Cryptology - EuroCrypt '93 Lecture Notes in Computer Science Volume 765 wallets

Published in: 101

Availability: 1 of 1(eBook)

By: Cramer R.

The breaking of the AR hash function

Subjects: Advances in Cryptology - EuroCrypt '93 Lecture Notes in Computer Science Volume 765 constructions hash functions

Published in: 101

Availability: 1 of 1(eBook)

By: Damgaard I. B.

Fresh Arrivals