Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Parallel Authentication and Public-Key EncryptionPieprzyk, Josef ; Pointcheval, DavidInformation Security and Privacy, 2003, p.387-401 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy PlaintextsYoung, Adam ; Yung, MotiInformation Security and Privacy, 2003, p.297-311 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
A Typed Theory for Access Control and Information Flow Control in Mobile SystemsWang, Libin ; Chen, KefeiInformation Security and Privacy, 2003, p.154-165 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
An Efficient Revocation Scheme with Minimal Message Length for Stateless ReceiversHwang, Yong Ho ; Kim, Chong Hee ; Lee, Pil JoongInformation Security and Privacy, 2003, p.377-386 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
On the Exact Security of Multi-signature Schemes Based on RSAKawauchi, Kei ; Tada, MitsuruInformation Security and Privacy, 2003, p.336-349 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Robust Software Tokens — Yet Another Method for Securing User’s Digital IdentityKwon, TaekyoungInformation Security and Privacy, 2003, p.476-487 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift RegistersTan, Chik How ; Yi, Xun ; Siew, Chee KheongInformation Security and Privacy, 2003, p.428-442 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Key Recovery Attacks on the RMAC, TMAC, and IACBCSung, Jaechul ; Hong, Deukjo ; Lee, SangjinInformation Security and Privacy, 2003, p.265-273 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
On Parallel Hash Functions Based on Block-CipherMatsuo, Toshihiko ; Kurosawa, KaoruInformation Security and Privacy, 2003, p.510-521 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Generic GF(2m) Arithmetic in Software and Its Application to ECCWeimerskirch, André ; Stebila, Douglas ; Shantz, Sheueling ChangInformation Security and Privacy, 2003, p.79-92 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |