On Solutions to the Key Escrow Problem
Mark P. Hoyle, Chris J. Mitchell
|
Block Ciphers — A Survey
Lars R. Knudsen
|
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function
Eike Kiltz
|
A Parallel Algorithm for Extending Cryptographic Hash Functions
Palash Sarkar, Paul J. Schellenberg
|
Autocorrelation Properties of Correlation Immune Boolean Functions
Subhamoy Maitra
|
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem
Amr Youssef, Guang Gong
|
Management of Secret Keys: Dynamic Key Handling
Joan Daemen
|
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining
Bok-Min Goi, M.U. Siddiqi, Hean-Teik Chuah
|
Frameproof and IPP Codes
Palash Sarkar, Douglas R. Stinson
|
Key Management Techniques
Walter Fumy
|
An Application of Sieve Methods to Elliptic Curves
S. Ali Miri, V. Kumar Murty
|
Re-dividing Complexity between Algorithms and Keys
Gideon Samid
|
A Twin Algorithm for Efficient Generation of Digital Signatures
D. Ramesh
|
Multiples of Primitive Polynomials over GF(2)
Kishan Chand Gupta, Subhamoy Maitra
|
Recent Developments in the Design of Conventional Cryptographic Algorithms
Bart Preneel, Vincent Rijmen, và Antoon Bosselaers
|