alt text

alt text


Contact Us

alt text

Our Location

alt text

How Can We Help?


Showing 10 Results, Digital:127, Print: 0

Showing Page No. 1 , Digital:127, Print: 0

A cryptanalysis of Step_k,m-cascades

By Gollmann, D.
101., ()

Subject: Advances in Cryptology - EuroCrypt '89; Lecture Notes in Computer Science Volume 434; clock-controlled generator; cascade ciphers; stream ciphers
Availability: 1 of 1(eBook)
Read More

A cryptographic library for the Motorola DSP 56000

By Dusse, S. R.
101., ()

Subject: Advances in Cryptology - EuroCrypt '90; Lecture Notes in Computer Science Volume 473; cryptographic coprocessors; modular arithmetic; Montgomery multiplication; software libraries
Availability: 1 of 1(eBook)
Read More

A fast correlation attack on nonlinearly feed-forward filtered shift-register sequences

By Forre, R.
101., ()

Subject: Advances in Cryptology - EuroCrypt '89; Lecture Notes in Computer Science Volume 434; correlation attack
Availability: 1 of 1(eBook)
Read More

A fast elliptic curve cryptosystem

By Agnew, G. B., Mullin, R. C.
101., ()

Subject: Advances in Cryptology - EuroCrypt '89; Lecture Notes in Computer Science Volume 434; efficient algorithms; elliptic curve cryptosystem
Availability: 1 of 1(eBook)
Read More

A general lower bound for the linear complexity of the product of shift-register sequences

By Goettfert, R.
101., ()

Subject: Advances in Cryptology - EuroCrypt '94; Lecture Notes in Computer Science Volume 950; linear complexity
Availability: 1 of 1(eBook)
Read More

A general zero-knowledge scheme

By Burmester, M. V. D., Desmedt, Y., Piper, F.
101., ()

Subject: Advances in Cryptology - EuroCrypt '89; Lecture Notes in Computer Science Volume 434; interactive proofs; Fiat-Shamir protocol; security; zero knowledge
Availability: 1 of 1(eBook)
Read More

A generalization of linear cryptanalysis and the applicability of Matsui's piling-up lemma

By Harpes, C., Kramer, G. G.
101., ()

Subject: Advances in Cryptology - EuroCrypt '95; Lecture Notes in Computer Science Volume 921; piling-up lemma; SAFER; cryptanalysis; IDEA block cipher; linear cryptanalysis; Data Encryption Standard
Availability: 1 of 1(eBook)
Read More

A generalized birthday attack

By Girault, M.
101., ()

Subject: Advances in Cryptology - EuroCrypt '88; Lecture Notes in Computer Science Volume 330; birthday attack
Availability: 1 of 1(eBook)
Read More

A generalized correlation attack with a probabilistic constrained edit distance

By Golic, J. D.
101., ()

Subject: Advances in Cryptology - EuroCrypt '92; Lecture Notes in Computer Science Volume 658; correlation attack
Availability: 1 of 1(eBook)
Read More

A linear construction of perfect secret sharing schemes

By Dijk, M. van
101., ()

Subject: Advances in Cryptology - EuroCrypt '94; Lecture Notes in Computer Science Volume 950; secret sharing; perfect secret sharing
Availability: 1 of 1(eBook)
Read More

<< Prev Next >>
                                                              
Most Viewed View All