Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
78 | Kazim Yumbul, Erkay Savas |
Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 143-151, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, computer architecture, public key cryptography, instruction set extensions, cryptographic algorithms, aes |
71 | Wen-Guey Tzeng |
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 14(1), pp. 182-188, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
cryptographic key assignment, secure broadcasting, cryptographic key backup, access control |
61 | Michael Backes 0001, Birgit Pfitzmann |
Relating Symbolic and Cryptographic Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 2(2), pp. 109-123, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Relations between models, probabilistic computation—cryptography, Dolev-Yao model, secrecy, simulatability |
61 | Michael Backes 0001, Birgit Pfitzmann |
Relating Symbolic and Cryptographic Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2005 IEEE Symposium on Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA, pp. 171-182, 2005, IEEE Computer Society, 0-7695-2339-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Xianxian Li, Jinpeng Huai |
Cryptographic protocol security analysis based on bounded constructing algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 49(1), pp. 26-47, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptographic protocol, formal analysis, security verification |
50 | Joan Daemen, René Govaerts, Joos Vandewalle |
A Hardware Design Model for Cryptographic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 419-434, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Hardware Cryptography, Pseudorandom Sequence Generators, Stream Ciphers, Block Ciphers, Cryptographic Hash Functions |
47 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Symmetric Authentication within a Simulatable Cryptographic Library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings, pp. 271-290, 2003, Springer, 3-540-20300-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
45 | David Nowak |
On Formal Verification of Arithmetic-Based Cryptographic Primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 368-382, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
machine formalization, CSPRBG, semantic security, cryptographic primitives |
44 | Sandro Bartolini, Roberto Giorgi, Enrico Martinelli |
Instruction Set Extensions for Cryptographic Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 191-233, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Çetin Kaya Koç |
About Cryptographic Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 1-4, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Werner Schindler |
Random Number Generators for Cryptographic Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 5-23, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Jorge Guajardo, Bart Preneel, Pim Tuyls, Ahmad-Reza Sadeghi |
09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
44 | Jorge Guajardo, Bart Preneel, Ahmad-Reza Sadeghi, Pim Tuyls |
09282 Executive Summary - Foundations for Forgery-Resilient Cryptographic Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
44 | Praveen Gauravaram, William Millan, Lauren May |
CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Algorithms and their Uses ![In: Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings, pp. 28-39, 2004, Queensland University of Technology, 1-74107-064-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
43 | Claus-Peter Schnorr, Serge Vaudenay |
The Black-Box Model for Cryptographic Primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(2), pp. 125-140, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Generic attacks, Generic attacks, Key words, Cryptographic primitives, Cryptographic primitives |
42 | Jonathan Katz, Steven A. Myers, Rafail Ostrovsky |
Cryptographic Counters and Applications to Electronic Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 78-92, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Donald Beaver, Stuart Haber |
Cryptographic Protocols Provably Secure Against Dynamic Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings, pp. 307-323, 1992, Springer, 3-540-56413-6. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
42 | Gordon B. Agnew |
Random Sources for Cryptographic Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings, pp. 77-81, 1987, Springer, 3-540-19102-X. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
42 | Michael Backes 0001, Birgit Pfitzmann |
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 233-245, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Alfonso De Gregorio |
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings, pp. 144-158, 2006, Springer, 3-540-46250-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Dominic Duggan |
Cryptographic Types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, pp. 238-252, 2002, IEEE Computer Society, 0-7695-1689-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Justifying a Dolev-Yao Model Under Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 1-41, 2004, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Yevgeniy Dodis, Joel Spencer |
On the (non)Universality of the One-Time Pad. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 43rd Symposium on Foundations of Computer Science (FOCS 2002), 16-19 November 2002, Vancouver, BC, Canada, Proceedings, pp. 376-, 2002, IEEE Computer Society, 0-7695-1822-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
40 | David Sinclair, David Gray, Geoff W. Hamilton |
Synthesising Attacks on Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis: Second International Conference, ATVA 2004, Taipei, Taiwan, ROC, October 31-November 3, 2004. Proceedings, pp. 49-63, 2004, Springer, 3-540-23610-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, model checking, cryptographic protocols |
38 | Sherman S. M. Chow |
Verifiable Pairing and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 170-187, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
verifiable pairing, threshold decryption, cryptographic protocols, Bilinear pairing, signcryption, undeniable signature, ID-based cryptography, cryptographic primitives, ID-based signature, exact security |
38 | Andrew J. Clark |
Physical Protection of Cryptographic Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings, pp. 83-93, 1987, Springer, 3-540-19102-X. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
38 | Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee |
Satisfiability-based framework for enabling side-channel attacks on cryptographic software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE Designers' Forum ![In: Proceedings of the Conference on Design, Automation and Test in Europe: Designers' Forum, DATE 2006, Munich, Germany, March 6-10, 2006, pp. 18-23, 2006, European Design and Automation Association, Leuven, Belgium, 3-9810801-0-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | John Patrick McGregor, Ruby B. Lee |
Protecting cryptographic keys and computations via virtual secure coprocessing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 33(1), pp. 16-26, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Mabroka Ali Mayouf, Zarina Shukur |
Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVIC ![In: Visual Informatics: Bridging Research and Practice, First International Visual Informatics Conference, IVIC 2009, Kuala Lumpur, Malaysia, November 11-13, 2009, Proceedings, pp. 510-520, 2009, Springer, 978-3-642-05035-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
possible attacks, animation, active learning, cryptographic protocols, visual metaphor |
36 | Jay A. McCarthy, Shriram Krishnamurthi |
Minimal backups of cryptographic protocol runs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008, pp. 11-20, 2008, ACM, 978-1-60558-288-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cppl, cryptographic protocols, coq, strand spaces |
36 | Shouhuai Xu, Ravi S. Sandhu |
A Scalable and Secure Cryptographic Service. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, pp. 144-160, 2007, Springer, 978-3-540-73533-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cryptographic service, compromise detection, compromise confinement, security, scalability, availability |
36 | Jacopo Giorgetti, Giuseppe Scotti, Andrea Simonetti, Alessandro Trifiletti |
Analysis of data dependence of leakage current in CMOS cryptographic hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007, Stresa, Lago Maggiore, Italy, March 11-13, 2007, pp. 78-83, 2007, ACM, 978-1-59593-605-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
leakage power consumption, side channel analysis, cryptographic hardware |
36 | Samuel Galice, Marine Minier, John Mullins, Stéphane Ubéda |
Cryptographic Protocol to Establish Trusted History of Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers, pp. 136-149, 2006, Springer, 978-3-540-69172-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trust management framework, cryptographic protocol, Identity based encryption |
36 | Manuel Barbosa, Pooya Farshim |
Secure Cryptographic Workflow in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 379-393, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cryptographic Workflow, Key Encapsulation, Secret Sharing, Identity-Based Encryption |
36 | Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu |
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, July 11-13 2005, Lisbon, Portugal, pp. 12-22, 2005, ACM, 1-59593-090-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
resolution strategies, verification, cryptographic protocols, horn clauses |
36 | Alaaeddine Fellah, John Mullins |
Admissible Interference by Typing for Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 123-135, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Admissible interference, Type systems, Process Algebra, Cryptographic Protocols, Security Properties |
36 | Phillip Rogaway, Thomas Shrimpton |
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 371-388, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
preimage resistance, second-preimage resistance, provable security, cryptographic hash functions, collision resistance |
36 | Jean Goubault-Larrecq, Slawomir Lasota 0001, David Nowak, Yu Zhang |
Complete Lax Logical Relations for Cryptographic Lambda-Calculi. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSL ![In: Computer Science Logic, 18th International Workshop, CSL 2004, 13th Annual Conference of the EACSL, Karpacz, Poland, September 20-24, 2004, Proceedings, pp. 400-414, 2004, Springer, 3-540-23024-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Cryptographic lambda-calculus, Subscone, Monads, Logical relations |
36 | Marcin Gomulkiewicz, Miroslaw Kutylowski |
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings, pp. 90-103, 2002, Springer, 3-540-44345-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
power analysis, side channel cryptanalysis, Hamming weight, cryptographic hardware |
36 | Karl Brincat, Chris J. Mitchell |
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings, pp. 63-72, 2001, Springer, 3-540-43026-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
cryptographic API, cryptanalysis, Message Authentication Code |
36 | Ahmad-Reza Sadeghi, Michael Steiner 0001 |
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 244-261, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Cryptographic Assumptions, Square Exponent, Inverse Exponent, Discrete Logarithms, Complexity Theory, Diffie-Hellman, Generic Algorithms |
36 | Hideki Imai, Atsuhiro Yamagishi |
CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 399-400, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
cryptographic technology, asymmmetric ciphers, evaluation, symmetric ciphers |
36 | T. H. Tse, Zhiquan Zhou, Tsong Yueh Chen |
Testing of Large Number Multiplication Functions in Cryptographic Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APAQS ![In: 1st Asia-Pacific Conference on Quality Software (APAQS 2000), 30-31 October 2000, Hong Kong, China, Proceedings, pp. 89-98, 2000, IEEE Computer Society, 0-7695-0825-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Cryptographic systems, large number multiplication, software testing |
36 | Roberto M. Amadio, Sanjiva Prasad |
The Game of the Name in Cryptographic Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computing Science - ASIAN'99, 5th Asian Computing Science Conference, Phuket, Thailand, December 10-12, 1999, Proceedings, pp. 15-26, 1999, Springer, 3-540-66856-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
$pi$-calculus, verification, cryptographic protocols |
36 | Jaeheung Lee, Junyoung Heo, Jaemin Park, Yookun Cho, Jiman Hong, Minkyu Park |
Buffer Cache Level Encryption for Embedded Secure Operating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference, EUC 2007, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 346-355, 2007, Springer, 978-3-540-77091-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Linux, Buffer Cache, Embedded Operating System, Cryptographic File System |
36 | Angelos D. Keromytis, Jason L. Wright, Theo de Raadt, Matthew Burnside |
Cryptography as an operating system service: A case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 24(1), pp. 1-38, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authentication, digital signatures, Encryption, hash functions, cryptographic protocols |
35 | Jorge Guajardo, Bart Preneel, Ahmad-Reza Sadeghi, Pim Tuyls (eds.) |
Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
35 | Subhamoy Maitra |
On the Studies Related to Linear Codes in Generalized Construction of Resilient Functions with Very High Nonlinearity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 140-149, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Svetla Nikova, Ventzislav Nikov |
Secret Sharing and Error Correcting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 28-38, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Rafael Álvarez, Gary McGuire |
S-Boxes, APN Functions and Related Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 49-62, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Peter Beelen, Gregor Leander |
Reconstruction of Highly Non Linear Sboxes from Linear Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 153-159, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Miodrag J. Mihaljevic |
A Framework for Stream Ciphers Based on Pseudorandomness, Randomness and Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 117-139, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Tor Helleseth, Michal Hojsík, Sondre Rønjom |
Algebraic Attacks on Filter and Combiner Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 39-48, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Oleg A. Logachev, Alexei A. Salnikov, Stanislav V. Smyshlyaev, Valery V. Yashchenko |
Symbolic Dynamics, Codes, and Perfectly Balanced Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 222-233, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Cees J. A. Jansen |
Linearities in Cascade Jump Controlled Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 179-191, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Agnes Andics |
Algebraic Immunity of Boolean Power Functions with Kasami and Niho Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 234-243, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Stefka Bouyuklieva |
Self-Dual Codes with Some Applications to Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 265-269, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Panagiotis Rizomiliotis |
New Results on the Algebraic Immunity of Boolean Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 192-202, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Sebastiaan Indesteege, Bart Preneel |
Coding Theory and Hash Function Design - A Case Study: The Lane Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 63-68, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Svetlana Topalova, Stela Zhelezova |
Classification of Doubly Resolvable Designs and Orthogonal Resolutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 260-264, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Stefan M. Dodunekov |
Applications of Near MDS Codes in Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 81-86, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Tor E. Bjørstad, Matthew Geoffrey Parker |
Equivalence Between Certain Complementary Pairs of Types I and III. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 203-221, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Marco Baldi |
LDPC Codes in the McEliece Cryptosystem: Attacks and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 160-174, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Claude Carlet |
On the Algebraic Immunities and Higher Order Nonlinearities of Vectorial Boolean Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 104-116, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Joan Daemen, Vincent Rijmen |
Codes and Provable Security of Ciphers - Extended abstract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 69-80, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Yuliang Zheng 0001 |
Coded Modulation and the Arrival of Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 17-27, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Yves Edel, Alexander Pott |
On the Equivalence of Nonlinear Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 87-103, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Gohar M. Kyureghyan, Yin Tan |
On a Family of Planar Mappings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 175-178, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Tsonka Baicheva |
Linear Codes of Good Error Control Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 250-259, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Yuri L. Borissov, Nikolai L. Manev |
Some Comments on Bossert-Mahr-Heilig Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 244-249, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Henk van Tilborg |
Authentication Codes from Error-Correcting Codes; An Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 3-16, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Pankaj Rohatgi |
Improved Techniques for Side-Channel Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 381-406, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Werner Schindler |
Evaluation Criteria for Physical Random Number Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 25-54, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Serdar Süer Erdem, Tugrul Yanik, Çetin Kaya Koç |
Fast Finite Field Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 75-104, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | François-Xavier Standaert |
Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 295-320, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Marc Joye |
Basics of Side-Channel Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 365-380, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Colin D. Walter |
Randomized Exponentiation Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 451-473, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Pankaj Rohatgi |
Electromagnetic Attacks and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 407-430, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Onur Aciiçmez, Çetin Kaya Koç |
Microarchitectural Attacks and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 475-504, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Erkay Savas, Çetin Kaya Koç |
Efficient Unified Arithmetic for Hardware Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 105-124, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Debrup Chakraborty, Francisco Rodríguez-Henríquez |
Block Cipher Modes of Operation from a Hardware Implementation Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 321-363, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Colin D. Walter |
Leakage from Montgomery Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 431-449, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Berk Sunar |
True Random Number Generators for Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 55-73, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Kris Gaj, Pawel Chodowiec |
FPGA and ASIC Implementations of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 235-294, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Nigel Boston, Matthew Darnall |
Elliptic and Hyperelliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 171-189, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Gökay Saldamli, Çetin Kaya Koç |
Spectral Modular Arithmetic for Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Engineering ![In: Cryptographic Engineering, pp. 125-169, 2009, Springer, 978-0-387-71816-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Darko Kirovski |
Anti-Counterfeiting: Mixing the Physical and the Digital World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
35 | Boris Skoric, Marc X. Makkes |
Simplification of Controlled PUF primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
35 | Philippe Teuwen |
How to Make Smartcards Resistant to Hackers' Lightsabers? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
35 | Patrick Schaumont |
Engineering On-Chip Thermal Effects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
35 | Boris Skoric, Pim Tuyls |
An efficient fuzzy extractor for limited noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
35 | Ed Dawson, Wolfgang Klemm (eds.) |
Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Algorithms and their Uses ![Queensland University of Technology, 1-74107-064-3 The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
35 | Yousef Bani Hammad, Gary Carter, Ed Dawson, Yvonne Hitchcock |
Improvements to the RAK Factoring Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Algorithms and their Uses ![In: Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings, pp. 152-, 2004, Queensland University of Technology, 1-74107-064-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
35 | Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee |
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Algorithms and their Uses ![In: Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings, pp. 57-71, 2004, Queensland University of Technology, 1-74107-064-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
35 | Hossein Ghodosi, Josef Pieprzyk |
A Modification to the 'Authentication of Concast Communication'. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Algorithms and their Uses ![In: Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings, pp. 72-77, 2004, Queensland University of Technology, 1-74107-064-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
35 | Mike Bond, Jolyon Clulow |
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Algorithms and their Uses ![In: Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings, pp. 140-151, 2004, Queensland University of Technology, 1-74107-064-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
35 | Matthew Henricksen, Ming Yao, Ernest Foo |
An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Algorithms and their Uses ![In: Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings, pp. 110-124, 2004, Queensland University of Technology, 1-74107-064-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
35 | Jaimee Brown, Ed Dawson, Juan Manuel González Nieto |
Implementation of the GBD Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Algorithms and their Uses ![In: Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings, pp. 94-109, 2004, Queensland University of Technology, 1-74107-064-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
35 | Chris Wullems, Harikrishna Vasanta, Mark Looi, Andrew J. Clark |
A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Algorithms and their Uses ![In: Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings, pp. 125-139, 2004, Queensland University of Technology, 1-74107-064-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
35 | Lan Nguyen, Reihaneh Safavi-Naini |
An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptographic Algorithms and their Uses ![In: Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings, pp. 40-56, 2004, Queensland University of Technology, 1-74107-064-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|