alt text

alt text


Contact Us

alt text

Our Location

alt text

How Can We Help?


Showing 10 Results, Digital:69, Print: 0

Showing Page No. 1 , Digital:69, Print: 0

A chosen plaintext attack of the 16-round cryptosystem

By Gilbert, H.
101., ()

Subject: Advances in Cryptology - Crypto '94; Lecture Notes in Computer Science Volume 839; Khufu
Availability: 1 of 1(eBook)
Read More

A high-speed DES implementation for network applications

By Eberle, H.
101., ()

Subject: Advances in Cryptology - Crypto '92; Lecture Notes in Computer Science Volume 740; Data Encryption Standard; hardware implementations
Availability: 1 of 1(eBook)
Read More

Algorithms for Black-Box Fields and Their Application to Cryptography

By Boneh, D.
101., ()

Subject: Advances in Cryptology - Crypto '96; Lecture Notes in Computer Science Volume 1109; relation to discrete logarithms; black box fields; Diffie-Hellman
Availability: 1 of 1(eBook)
Read More

An attack on the last two rounds of MD4

By den Boer, B.
101., ()

Subject: Advances in Cryptology - Crypto '91; Lecture Notes in Computer Science Volume 576; MD4 hash function
Availability: 1 of 1(eBook)
Read More

An efficient existentially unforgeable signature scheme and its applications

By Dwork, C.
101., ()

Subject: Advances in Cryptology - Crypto '94; Lecture Notes in Computer Science Volume 839; digital signatures; variations; existentially computationally unforgeable; RSA
Availability: 1 of 1(eBook)
Read More

An identity-based signature scheme with bounded life-span

By Delos, O.
101., ()

Subject: Advances in Cryptology - Crypto '94; Lecture Notes in Computer Science Volume 839; identity-based cryptosystems
Availability: 1 of 1(eBook)
Read More

An implementation of the general number field sieve

By Buchmann, J. A., Loho, J.
101., ()

Subject: Advances in Cryptology - Crypto '93; Lecture Notes in Computer Science Volume 773; discrete logarithms; number field sieve
Availability: 1 of 1(eBook)
Read More

An l-span generalized secret sharing scheme

By Harn, L.
101., ()

Subject: Advances in Cryptology - Crypto '92; Lecture Notes in Computer Science Volume 740; secret sharing
Availability: 1 of 1(eBook)
Read More

Attack on the cryptographic scheme NIKS-TAS

By Coppersmith, D.
101., ()

Subject: Advances in Cryptology - Crypto '94; Lecture Notes in Computer Science Volume 839; cryptanalysis
Availability: 1 of 1(eBook)
Read More

Attacks on the birational permutation signature schemes

By Coppersmith, D., Stern, J.
101., ()

Subject: Advances in Cryptology - Crypto '93; Lecture Notes in Computer Science Volume 773; birational permutations
Availability: 1 of 1(eBook)
Read More

<< Prev Next >>
                                                              
Most Viewed View All