Welcome, Guest.Sign in for full access to IOU Digital Library's resources.

Welcome to IOU Digital Library

Page 1 | Results on this page: 10 | Digital Books: 45 | Physical Books: 0

A high-speed DES implementation for network applications

Subjects: Advances in Cryptology - Crypto '92 Lecture Notes in Computer Science Volume 740 Data Encryption Standard hardware implementations

Published in: 101

Availability: 1 of 1(eBook)

By: Eberle H.

An efficient existentially unforgeable signature scheme and its applications

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 digital signatures variations existentially computationally unforgeable RSA

Published in: 101

Availability: 1 of 1(eBook)

By: Dwork C.

An identity-based signature scheme with bounded life-span

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 identity-based cryptosystems

Published in: 101

Availability: 1 of 1(eBook)

By: Delos O.

An implementation of the general number field sieve

Subjects: Advances in Cryptology - Crypto '93 Lecture Notes in Computer Science Volume 773 discrete logarithms number field sieve

Published in: 101

Availability: 1 of 1(eBook)

By: Buchmann J. A. Loho J.

An l-span generalized secret sharing scheme

Subjects: Advances in Cryptology - Crypto '92 Lecture Notes in Computer Science Volume 740 secret sharing

Published in: 101

Availability: 1 of 1(eBook)

By: Harn L.

Design of elliptic curves with controllable lower boundary of extension degree for reduction attacks

Subjects: Advances in Cryptology - Crypto '94 Lecture Notes in Computer Science Volume 839 efficient algorithms elliptic curve cryptosystem

Published in: 101

Availability: 1 of 1(eBook)

By: Chao J. Tanada K.

Designing and detecting trapdoors for discrete log cryptosystems

Subjects: Advances in Cryptology - Crypto '92 Lecture Notes in Computer Science Volume 740 key generation number field sieve trapdoors

Published in: 101

Availability: 1 of 1(eBook)

By: Gordon D. M.

Differential cryptanalysis of DES-like cryptosystems (Extended abstract)

Subjects: Advances in Cryptology - Crypto '90 Lecture Notes in Computer Science Volume 537 Data Encryption Standard DES differential cryptanalysis Data Encryption Standard cryptanalysis differential cryp

Published in: 101

Availability: 1 of 1(eBook)

By: Biham E.

Differential cryptanalysis of Lucifer

Subjects: Advances in Cryptology - Crypto '93 Lecture Notes in Computer Science Volume 773 differential cryptanalysis Lucifer Lucifer block cipher

Published in: 101

Availability: 1 of 1(eBook)

By: Ben Aroya I.

Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer (Extended abstract)

Subjects: Advances in Cryptology - Crypto '91 Lecture Notes in Computer Science Volume 576 differential cryptanalysis Lucifer differential cryptanalysis REDOC-II differential cryptanalysis LOKI differen

Published in: 101

Availability: 1 of 1(eBook)

By: Biham E.

Fresh Arrivals