ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Cryptography and Coding - Lecture Notes in Computer Science
Latest Publications
TOTAL DOCUMENTS
29
(FIVE YEARS 0)
H-INDEX
9
(FIVE YEARS 0)
Published By Springer Berlin Heidelberg
9783540206637, 9783540409748
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Uses and Abuses of Cryptography
Cryptography and Coding - Lecture Notes in Computer Science
◽
10.1007/978-3-540-40974-8_11
◽
2003
◽
pp. 125-132
Author(s):
Richard Walton
Download Full-text
A Designer’s Guide to KEMs
Cryptography and Coding - Lecture Notes in Computer Science
◽
10.1007/978-3-540-40974-8_12
◽
2003
◽
pp. 133-151
◽
Cited By ~ 49
Author(s):
Alexander W. Dent
Download Full-text
Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups
Cryptography and Coding - Lecture Notes in Computer Science
◽
10.1007/978-3-540-40974-8_19
◽
2003
◽
pp. 234-244
◽
Cited By ~ 1
Author(s):
George Petrides
Keyword(s):
Word Problem
◽
Public Key
◽
Public Key Cryptosystem
◽
The Public
Download Full-text
Analysis of Double Block Length Hash Functions
Cryptography and Coding - Lecture Notes in Computer Science
◽
10.1007/978-3-540-40974-8_23
◽
2003
◽
pp. 290-302
◽
Cited By ~ 17
Author(s):
Mitsuhiro Hattori
◽
Shoichi Hirose
◽
Susumu Yoshida
Keyword(s):
Hash Functions
◽
Block Length
◽
Double Block Length
Download Full-text
Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity
Cryptography and Coding - Lecture Notes in Computer Science
◽
10.1007/978-3-540-40974-8_15
◽
2003
◽
pp. 183-189
◽
Cited By ~ 7
Author(s):
Harald Niederreiter
◽
Igor E. Shparlinski
Keyword(s):
Linear Complexity
◽
Periodic Sequences
◽
Error Linear Complexity
Download Full-text
More Detail for a Combined Timing and Power Attack against Implementations of RSA
Cryptography and Coding - Lecture Notes in Computer Science
◽
10.1007/978-3-540-40974-8_20
◽
2003
◽
pp. 245-263
◽
Cited By ~ 12
Author(s):
Werner Schindler
◽
Colin D. Walter
Download Full-text
Mental Poker Revisited
Cryptography and Coding - Lecture Notes in Computer Science
◽
10.1007/978-3-540-40974-8_29
◽
2003
◽
pp. 370-383
◽
Cited By ~ 18
Author(s):
Adam Barnett
◽
Nigel P. Smart
Download Full-text
Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class
Cryptography and Coding - Lecture Notes in Computer Science
◽
10.1007/978-3-540-40974-8_9
◽
2003
◽
pp. 93-114
◽
Cited By ~ 7
Author(s):
Enes Pasalic
Keyword(s):
Boolean Functions
Download Full-text
Remote User Authentication Using Public Information
Cryptography and Coding - Lecture Notes in Computer Science
◽
10.1007/978-3-540-40974-8_28
◽
2003
◽
pp. 360-369
◽
Cited By ~ 12
Author(s):
Chris J. Mitchell
Keyword(s):
User Authentication
◽
Public Information
◽
Remote User Authentication
◽
Remote User
Download Full-text
Efficient Key Updating Signature Schemes Based on IBS
Cryptography and Coding - Lecture Notes in Computer Science
◽
10.1007/978-3-540-40974-8_14
◽
2003
◽
pp. 167-182
◽
Cited By ~ 8
Author(s):
Dae Hyun Yum
◽
Pil Joong Lee
Keyword(s):
Signature Schemes
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close