„Network Coding“
Suchergebnisse
3.793 Treffer
-
The Security of Feistel Ciphers with Six Rounds or Less
-
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
-
Elliptic Curve Paillier Schemes
-
A cipher based on data-dependent permutations
-
Constructive and destructive facets of Weil descent on elliptic curves
-
Cryptanalysis of the ANSI X9.52 CBCM mode
-
Improving the exact security of digital signature schemes
-
Almost k -Wise Independent Sample Spaces and Their Cryptologic Applications
-
Attacks on Block Ciphers of Low Algebraic Degree
-
Dynamic Traitor Tracing
-
Complexity Bounds on General Hard-Core Predicates
-
Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography
-
Cryptanalysis of the Chor—Rivest Cryptosystem
-
Weakness in Quaternion Signatures
-
On the Existence of Secure Keystream Generators
-
How to Protect DES Against Exhaustive Key Search (an Analysis of DESX)
-
Computing Discrete Logarithms in Quadratic Orders
-
Kangaroos, Monopoly and Discrete Logarithms
-
A Detailed Analysis of SAFER K
-
Security Arguments for Digital Signatures and Blind Signatures