Welcome, Guest.Sign in for full access to IOU Digital Library's resources.

Welcome to IOU Digital Library

Page 1 | Results on this page: 10 | Digital Books: 12 | Physical Books: 0

A general lower bound for the linear complexity of the product of shift-register sequences

Subjects: Advances in Cryptology - EuroCrypt '94 Lecture Notes in Computer Science Volume 950 linear complexity

Published in: 101

Availability: 1 of 1(eBook)

By: Goettfert R.

A linear construction of perfect secret sharing schemes

Subjects: Advances in Cryptology - EuroCrypt '94 Lecture Notes in Computer Science Volume 950 secret sharing perfect secret sharing

Published in: 101

Availability: 1 of 1(eBook)

By: Dijk M. van

An improvement of Davies' attack on DES

Subjects: Advances in Cryptology - EuroCrypt '94 Lecture Notes in Computer Science Volume 950 Data Encryption Standard cryptanalysis

Published in: 101

Availability: 1 of 1(eBook)

By: Biham E.

Blind signatures based on the discrete logarithm problem

Subjects: Advances in Cryptology - EuroCrypt '94 Lecture Notes in Computer Science Volume 950 blind signatures

Published in: 101

Availability: 1 of 1(eBook)

By: Camenisch J. L. Piveteau J. M.

Comments on Soviet encryption algorithm

Subjects: Advances in Cryptology - EuroCrypt '94 Lecture Notes in Computer Science Volume 950 GOST

Published in: 101

Availability: 1 of 1(eBook)

By: Charnes C. O'Connor L. Pieprzyk J. Safavi-Naini R.

Designated confirmer signatures

Subjects: Advances in Cryptology - EuroCrypt '94 Lecture Notes in Computer Science Volume 950 designated confirmer signatures

Published in: 101

Availability: 1 of 1(eBook)

By: Chaum D.

Embedding and probabilistic correlation attacks on clock-controlled shift registers

Subjects: Advances in Cryptology - EuroCrypt '94 Lecture Notes in Computer Science Volume 950 clock-controlled generator correlation attack stream ciphers

Published in: 101

Availability: 1 of 1(eBook)

By: Golic J. D.

Feedback registers based on ramified extensions of the 2-adic numbers

Subjects: Advances in Cryptology - EuroCrypt '94 Lecture Notes in Computer Science Volume 950 Berlekamp-Massey algorithm stream ciphers feedback shift registers

Published in: 101

Availability: 1 of 1(eBook)

By: Goresky M.

Linking information reconciliation and privacy amplification

Subjects: Advances in Cryptology - EuroCrypt '94 Lecture Notes in Computer Science Volume 950 privacy amplification

Published in: 101

Availability: 1 of 1(eBook)

By: Cachin C.

Fresh Arrivals