History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 163 total

Full analysis of {\sc PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures. (English)
Des. Codes Cryptography 73, No. 3, 997-1022 (2014).
WorldCat.org
1
Towards lattice based aggregate signatures. (English)
Pointcheval, David (ed.) et al., Progress in cryptology ‒ AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28‒30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 336-355 (2014).
WorldCat.org
2
Long term confidentiality: a survey. (English)
Des. Codes Cryptography 71, No. 3, 459-478 (2014).
WorldCat.org
3
Linearization Equation Attack on 2-Layer Nonlinear Piece in Hand Method. (English)
IEICE TransactionsIEICE Transactions 97-A, N0. 9, 1952-1961(2014)
WorldCat.org
4
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland. (English)
Datenschutz und DatensicherheitDatenschutz und Datensicherheit 38, N0. 2, 98-102(2014)
WorldCat.org
5
On the Efficiency of Provably Secure NTRU. (English)
PQCrypto, 22-39(2014)
WorldCat.org
6
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures. (English)
Des. Codes CryptographyDes. Codes Cryptography 73, N0. 3, 997-1022(2014)
WorldCat.org
7
Introduction to public key infrastructures. (English)
Berlin: Springer (ISBN 978-3-642-40656-0/hbk; 978-3-642-40657-7/ebook). xv, 194~p. EUR~53.49; SFR~67.00; \sterling~44.99; \$~69.99 (2013).
WorldCat.org
8
On the security of the Winternitz one-time signature scheme. (English)
Int. J. Appl. Cryptogr. 3, No. 1, 84-96 (2013).
WorldCat.org
9
Towards a publicly-verifiable mix-net providing everlasting privacy. (English)
Sadeghi, Ahmad-Reza (ed.), Financial cryptography and data security. 17th international conference, FC 2013, Okinawa, Japan, April 1‒5, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-39883-4/pbk). Lecture Notes in Computer Science 7859, 197-204 (2013).
WorldCat.org
10
Minkowski, Hermite, and the internet. (Minkowski, Hermite und das Internet.) (German)
Mitt. Dtsch. Math.-Ver. 21, No. 3, 156-160 (2013).
WorldCat.org
11
A multivariate based threshold ring signature scheme. (English)
Appl. Algebra Eng. Commun. Comput. 24, No. 3-4, 255-275 (2013).
WorldCat.org
12
Fast verification for improved versions of the UOV and rainbow signature schemes. (English)
Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4‒7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 188-202 (2013).
WorldCat.org
13
Cryptanalysis of hash-based tamed transformation and minus signature scheme. (English)
Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4‒7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 155-164 (2013).
WorldCat.org
14
Optimizing guessing strategies for algebraic cryptanalysis with applications to EPCBC. (English)
Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28‒30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 175-197 (2013).
WorldCat.org
15
Many weak keys for printcipher: fast key recovery and countermeasures. (English)
Dawson, Ed (ed.), Topics in cryptology ‒ CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 189-206 (2013).
WorldCat.org
16
Optimal parameters for $XMSS^{MT }$. (English)
Cuzzocrea, Alfredo (ed.) et al., Security engineering and intelligence informatics. CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40587-7/pbk). Lecture Notes in Computer Science 8128, 194-208 (2013).
WorldCat.org
17
Cryptanalysis of 2-layer nonlinear piece in hand method. (English)
Cuzzocrea, Alfredo (ed.) et al., Security engineering and intelligence informatics. CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40587-7/pbk). Lecture Notes in Computer Science 8128, 91-104 (2013).
WorldCat.org
18
How to avoid the breakdown of public key infrastructures. Forward secure signatures for certificate authorities. (English)
De Capitani di Vimercati, Sabrina (ed.) et al., Public key infrastructures, services and applications. 9th European workshop, EuroPKI 2012, Pisa, Italy, September 13‒14, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-40011-7/pbk). Lecture Notes in Computer Science 7868, 53-68 (2013).
WorldCat.org
19
Improvement and Efficient Implementation of a Lattice-Based Signature Scheme. (English)
Selected Areas in Cryptography, 48-67(2013)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 163 total

Valid XHTML 1.0 Transitional Valid CSS!