|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 391 occurrences of 265 keywords
|
|
|
Results
Found 930 publication records. Showing 930 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
1 | Dong-Guk Han, Jongin Lim 0001, Kouichi Sakurai |
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
XTR Public Key Cryptosystem, Data-bit DPA, Address-bit DPA, doubling attack, Side Channel Attacks, SPA |
1 | Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
IDEA and MESH ciphers, known-plaintext attack, Cryptanalysis |
1 | Michael J. Jacobson Jr. |
The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Chae Hoon Lim |
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Tetsu Iwata, Kaoru Kurosawa |
How to Re-use Round Function in Super-Pseudorandom Permutation. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto |
Protocols with Security Proofs for Mobile Applications. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
secure key exchange, authenticator, Provable security, mobile security |
1 | Chun Ruan, Vijay Varadharajan |
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Luke McAven, Reihaneh Safavi-Naini, Moti Yung |
Unconditionally Secure Encryption Under Strong Attacks. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Signature. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
public-key signature, identity-based signature, Certificateless signature |
1 | Zhiguo Wan, Shuhong Wang 0001 |
Cryptanalysis of Two Password-Authenticated Key Exchange Protocols. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Feng Bao 0001 |
Analysis of a Conference Scheme Under Active and Passive Attacks. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee 0002 |
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
CIKS-1, Related Key differential attack, Data-dependent rotation, SPECTR-H64 |
1 | Vu Dong Tô, Reihaneh Safavi-Naini |
Linear Code Implies Public-Key Traitor Tracing with Revocation. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Serge Vaudenay |
Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSA. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Tomoyuki Asano |
Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Wonil Lee, Mridul Nandi, Palash Sarkar 0001, Donghoon Chang, Sangjin Lee 0002, Kouichi Sakurai |
Pseudorandomness of SPN-Type Transformations. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson |
A Mobile Agent System Providing Offer Privacy. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | SungJun Min, Go Yamamoto, Kwangjo Kim |
Weak Property of Malleability in NTRUSign. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
NTRUSign, Strong Existential Forgery, Centered Norm, Digital Signature Scheme, Malleability |
1 | Willy Susilo, Fangguo Zhang, Yi Mu 0001 |
Identity-Based Strong Designated Verifier Signature Schemes. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Shaoquan Jiang, Guang Gong |
Multi-service Oriented Broadcast Encryption. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski |
Secure Bilinear Diffie-Hellman Bits. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Giraud 0001, Erik Woodward Knudsen |
Fault Attacks on Signature Schemes. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
XTR-DSA, Schnorr signature, Side-Channel Attack, Smartcard, Fault Attack, Signature schemes, DSA, ECDSA, ElGamal signature |
1 | Brian King, Ben Rubin |
Improvements to the Point Halving Algorithm. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Toru Nakanishi 0001, Yuji Sugiyama |
A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Membership revocation, Zero-knowledge proof of integer relations, Strong RSA assumption, Group signature scheme |
1 | Arjen K. Lenstra, Tim Voss |
Information Security Risk Assessment, Aggregation, and Mitigation. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
risk aggregation, risk mitigation, Basel 2, multiple-choice knapsack problem, Risk management, risk assessment |
1 | Gildas Avoine, Serge Vaudenay |
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Marcus Peinado, Yuqun Chen, Paul England, John Manferdelli |
NGSCB: A Trusted Open System. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Bo-Yin Yang, Jiun-Ming Chen |
Theoretical Analysis of XL over Small Fields. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee 0002 |
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Differential-Linear Type Attacks, SHACAL-2, Block Cipher |
1 | Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas J. Winter 0002 |
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yan-Cheng Chang |
Single Database Private Information Retrieval with Logarithmic Communication. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Joseph K. Liu, Victor K. Wei, Duncan S. Wong |
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee |
TTS without Revocation Capability Secure Against CCA2. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Toshihiko Matsuo |
How to Remove MAC from DHIES. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
DHIES, hybrid encryption scheme |
1 | Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee 0002, Dowon Hong |
The Related-Key Rectangle Attack - Application to SHACAL-1. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
The Rectangle Attack, The Related-Key Attack, The Related-Key Rectangle Attack, SHACAL-1, Block Ciphers |
1 | Zhenjie Huang, Yumin Wang |
Convertible Nominative Signatures. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
nominative signature, untransferable, Digital signature, convertible |
1 | Xibin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 |
Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Secure commercial applications, Access Control, Authorization, Distributed system security |
1 | Feng Bao 0001, Guilin Wang, Jianying Zhou 0001, Huafei Zhu |
Analysis and Improvement of Micali's Fair Contract Signing Protocol. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Kei Kawauchi, Mitsuru Tada |
On the Extract Security of Multi-signature Schemes Based on RSA. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Seigo Arita |
An Addition Algorithm in Jacobian of C34 Curve. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao |
Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Abhishek Singh, Ola Nordström, Chenghuai Lu, André L. M. dos Santos |
Malicious ICMP Tunneling: Defense against the Vulnerability. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Chik How Tan, Xun Yi, Chee Kheong Siew |
A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
adaptive chosen-ciphertext attack, Public key cryptosystem, shift registers |
1 | Toshihiko Matsuo, Kaoru Kurosawa |
On Parallel Hash Functions Based on Block-Cipher. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
block cipher, hash function |
1 | Sung-Ming Yen |
Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Li Gong |
Is Cross-Platform Security Possible? |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Andrew M. Odlyzko |
The Unsolvable Privacy Problem and Its Implications for Security Technologies. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Feng Bao 0001 |
Cryptanalysis of a New Cellular Automata Cryptosystem. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Daewan Han, Jin Hong 0001, Jae Woo Han, Daesung Kwon |
Key Recovery Attacks on NTRU without Ciphertext Validation Routine. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Pino Persiano, Ivan Visconti |
An Anonymous Credential System and a Privacy-Aware PKI. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Swee-Huay Heng, Kaoru Kurosawa |
Square Hash with a Small Key Size. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
square hash, Message authentication codes, universal hash |
1 | Vanesa Daza, Javier Herranz, Germán Sáez |
Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Libin Wang, Kefei Chen |
A Typed Theory for Access Control and Information Flow Control in Mobile Systems. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim |
Practical Pay TV Schemes. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Set-top terminal, Cracker Identification, Broadcast Encryption, Pay TV |
1 | Khoongming Khoo, Guang Gong |
New Constructions for Resilient and Highly Nonlinear Boolean Functions. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Mads Jurik |
A Length-Flexible Threshold Cryptosystem with Applications. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
length-flexible, length-invariant, group decryption, self-tallying, perfect ballot secrecy, election, mix-net |
1 | Taekyoung Kwon 0002 |
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Yong Ho Hwang, Chong Hee Kim, Pil Joong Lee |
An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jason Reid, Ian Cheong, Matthew Henricksen, Jason Smith 0001 |
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Hideki Imai |
Flaws in Some Robust Optimistic Mix-Nets. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Ha Yoon Song, Han-gyoo Kim |
Cooperative Routers against DoS Attacks. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa |
On the Pseudorandomness of KASUMI Type Permutations. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Reihaneh Safavi-Naini, Jennifer Seberry (eds.) |
Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, Jacques Traoré |
On Fair E-cash Systems Based on Group Signature Schemes. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Laurence Bull, David McG. Squire, Jan Newmarch, Yuliang Zheng 0001 |
Grouping Verifiable Content for Selective Disclosure. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Selective content disclosure, content extraction signatures, privacy-enhancing signatures, fragment grouping |
1 | Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah, Sung Won Sohn |
Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai |
Separating Encryption and Key Issuance in Digital Rights Management Systems. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee |
EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | André Weimerskirch, Douglas Stebila, Sheueling Chang Shantz |
Generic GF(2) Arithmetic in Software and Its Application to ECC. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Dense Field Polynomials, Field Multiplication, Field Reduction, Elliptic Curves, Koblitz Curves, Binary Fields |
1 | Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park 0001, Chang Han Kim, Heuisu Ryu |
Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
SPA attack, Randomized addition-subtraction chains countermeasure, Side-channel attack, Elliptic curve cryptosystems |
1 | Fangguo Zhang, Kwangjo Kim |
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Bilinear pairings, Proxy signature, Blind signature, ID-based cryptography |
1 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Permanent Fault Attack on the Parameters of RSA with CRT. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
1 | Chien-Ning Chen, Sung-Ming Yen |
Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Differential fault analysis (DFA), Smart cards, AES, Rijndael, Physical cryptanalysis |
1 | Hwankoo Kim, Sang-Jae Moon |
Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba |
Theoretical Analysis of chi2 Attack on RC6. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
$chi^2$ attack, RC6, Transition Matrix |
1 | Jaechul Sung, Deukjo Hong, Sangjin Lee 0002 |
Key Recovery Attacks on the RMAC, TMAC, and IACBC. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
RMAC, TMAC, XCBC, IACBC, Message Authentication Codes, Modes of Operation, Key Recovery Attacks, CBC-MAC |
1 | Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto |
Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson |
The Security of Fixed versus Random Elliptic Curves in Cryptography. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk, David Pointcheval |
Josef Pieprzyk, David Pointcheval. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
privacy, authentication, parallelization, Signcryption |
1 | Andreas Pashalidis, Chris J. Mitchell |
A Taxonomy of Single Sign-On Systems. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
1 | Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee 0001, Jong In Lim 0001 |
Digital Signature Schemes with Restriction on Signing Capability. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji |
Evaluation of Anonymity of Practical Anonymous Communication Networks. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Ali Kanso |
Clock-Controlled Shrinking Generator of Feedback Shift Registers. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Fangguo Zhang, Shengli Liu 0001, Kwangjo Kim |
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Hyperelliptic curve cryptosystems(HCC), Domain parameters, Jacobian |
1 | Jianying Zhou 0001 |
Maintaining the Validity of Digital Signatures in B2B Applications. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Hongjun Wu 0001, Feng Bao 0001 |
Cryptanalysis of Stream Cipher COS(2, 128) Mode I. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Biljana Cubaleska, Weidong Qiu, Markus Schneider 0002 |
How to Play Sherlock Holmes in the World of Mobile Agents. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Ingrid Biehl, Tsuyoshi Takagi |
A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Distributed RSA, quadratic fields, parallel computation, primality test |
1 | Brian King |
Requirements for Group Independent Linear Threshold Secret Sharing Schemes. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
linear secret sharing, group independent linear threshold schemes, monotone span programs and bounds on share size, secret sharing, threshold cryptography |
1 | Matthew J. Warren, Lynn Margaret Batten |
Security Management: An Information Systems Setting. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson |
Strengthening the Key Schedule of the AES. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Yi Mu 0001, Junqi Zhang, Vijay Varadharajan |
m out of n Oblivious Transfer. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Krista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu |
Efficient Sharing of Encrypted Data. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Michael Hitchens, Vijay Varadharajan, Gregory Saunders |
Policy Administration Domains. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Hyun-Jeong Kim, Dong Hoon Lee 0001, Moti Yung |
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Dong-Guk Han, Hye-Young Park, Young-Ho Park 0001, Sangjin Lee 0002, Dong Hoon Lee 0001, Hyungjin Yang |
A Practical Approach Defeating Blackmailing. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | James P. Hughes 0001 |
A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | YoungJu Choie, D. Yun |
Isomorphism Classes of Hyperelliptic Curves of Genus 2 over Fq. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 930 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|