skip to main content
Resultados 1 2 3 4 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Parallel Authentication and Public-Key Encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Parallel Authentication and Public-Key Encryption

Pieprzyk, Josef ; Pointcheval, David

Information Security and Privacy, 2003, p.387-401 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

2
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts
Material Type:
Artigo
Adicionar ao Meu Espaço

Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts

Young, Adam ; Yung, Moti

Information Security and Privacy, 2003, p.297-311 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

3
A Typed Theory for Access Control and Information Flow Control in Mobile Systems
Material Type:
Artigo
Adicionar ao Meu Espaço

A Typed Theory for Access Control and Information Flow Control in Mobile Systems

Wang, Libin ; Chen, Kefei

Information Security and Privacy, 2003, p.154-165 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

4
An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers
Material Type:
Artigo
Adicionar ao Meu Espaço

An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers

Hwang, Yong Ho ; Kim, Chong Hee ; Lee, Pil Joong

Information Security and Privacy, 2003, p.377-386 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

5
On the Exact Security of Multi-signature Schemes Based on RSA
Material Type:
Artigo
Adicionar ao Meu Espaço

On the Exact Security of Multi-signature Schemes Based on RSA

Kawauchi, Kei ; Tada, Mitsuru

Information Security and Privacy, 2003, p.336-349 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

6
Robust Software Tokens — Yet Another Method for Securing User’s Digital Identity
Material Type:
Artigo
Adicionar ao Meu Espaço

Robust Software Tokens — Yet Another Method for Securing User’s Digital Identity

Kwon, Taekyoung

Information Security and Privacy, 2003, p.476-487 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

7
A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers
Material Type:
Artigo
Adicionar ao Meu Espaço

A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers

Tan, Chik How ; Yi, Xun ; Siew, Chee Kheong

Information Security and Privacy, 2003, p.428-442 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

8
Key Recovery Attacks on the RMAC, TMAC, and IACBC
Material Type:
Artigo
Adicionar ao Meu Espaço

Key Recovery Attacks on the RMAC, TMAC, and IACBC

Sung, Jaechul ; Hong, Deukjo ; Lee, Sangjin

Information Security and Privacy, 2003, p.265-273 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

9
On Parallel Hash Functions Based on Block-Cipher
Material Type:
Artigo
Adicionar ao Meu Espaço

On Parallel Hash Functions Based on Block-Cipher

Matsuo, Toshihiko ; Kurosawa, Kaoru

Information Security and Privacy, 2003, p.510-521 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

10
Generic GF(2m) Arithmetic in Software and Its Application to ECC
Material Type:
Artigo
Adicionar ao Meu Espaço

Generic GF(2m) Arithmetic in Software and Its Application to ECC

Weimerskirch, André ; Stebila, Douglas ; Shantz, Sheueling Chang

Information Security and Privacy, 2003, p.79-92 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

Resultados 1 2 3 4 next page

Buscando em bases de dados remotas. Favor aguardar.