Welcome, Guest.Sign in for full access to IOU Digital Library's resources.

Welcome to IOU Digital Library

Page 1 | Results on this page: 10 | Digital Books: 13 | Physical Books: 0

A chosen plaintext attack of the 16-round cryptosystem

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 Khufu

Published in: 101

Availability: 1 of 1(eBook)

By: Gilbert H.

An efficient existentially unforgeable signature scheme and its applications

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 digital signatures variations existentially computationally unforgeable RSA

Published in: 101

Availability: 1 of 1(eBook)

By: Dwork C.

An identity-based signature scheme with bounded life-span

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 identity-based cryptosystems

Published in: 101

Availability: 1 of 1(eBook)

By: Delos O.

Attack on the cryptographic scheme NIKS-TAS

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 cryptanalysis

Published in: 101

Availability: 1 of 1(eBook)

By: Coppersmith D.

Bounds for resilient functions and orthogonal arrays

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 orthogonal arrays resilient functions

Published in: 101

Availability: 1 of 1(eBook)

By: Bierbrauer J. Gopalakrishnan K.

Cryptanalysis of cryptosystems based on remote chaos replication

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 chaotic maps cryptanalysis

Published in: 101

Availability: 1 of 1(eBook)

By: Beth T. Lazic D. E.

Cryptanalysis of the Gemmell and Naor multiround authentication protocol

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 authentication codes interactive authentication codes interactive authentication

Published in: 101

Availability: 1 of 1(eBook)

By: Gehrmann C.

Cryptographic protocols based on discrete logarithms in real-quadratic orders

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 discrete logarithms class groups quadratic fields

Published in: 101

Availability: 1 of 1(eBook)

By: Biehl I. Buchmann J. A.

Cryptographic randomness from air turbulence in disk drives

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 pseudo-randomness

Published in: 101

Availability: 1 of 1(eBook)

By: Davis D. Ihaka R.

Design of elliptic curves with controllable lower boundary of extension degree for reduction attacks

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 efficient algorithms elliptic curve cryptosystem

Published in: 101

Availability: 1 of 1(eBook)

By: Chao J. Tanada K.

Fresh Arrivals