Data Security - CM 0321 (2001)

by Antonia J. Jones , Antonia J. Jones , Lecturer Antonia , J. Jones

Active Bibliography

MODULE: Data Security – Antonia J. Jones, Antonia J. Jones, Lecturer Antonia, J. Jones - 1996
8 Answers To Frequently Asked Questions About Today's Cryptography – Paul Fahn - 1993
Codes -- The Guide to Secrecy . . . – Richard A. Mollin
Cryptographic Primitives – Paul Garrett - 2007
1 Cryptology – Prof Ronald Rivest, L. Rivest
2 Survey of Computational Assumptions Used in Cryptography Broken or Not by Shor's Algorithm – Hong Zhu - 2001
A Cryptosystem Based on the Symmetric Group Sn – Javad N. Doliskani, Ehsan Malekian, Ali Zakerolhosseini
3 An Experience Teaching a Graduate Course in Cryptography – Aviel D. Rubin - 1997
unknown title – Foreword Whitfield Diffie
54 Twofish: A 128-Bit Block Cipher – Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson - 1998
1 PSEC: Provably Secure Elliptic Curve Encryption Scheme – Eiichiro Fujisaki, Tetsutaro Kobayashi, Hikaru Morita, Hiroaki Oguro, Tatsuaki Okamoto, Satomi Okazaki, David Pointcheval - 2000
7 PSEC: Provably Secure Elliptic Curve Encryption Scheme – Tatsuaki Okamoto, Eiichiro Fujisaki, Hikaru Morita - 2000
2 EPOC: Efficient Probabilistic Public-Key Encryption – Eiichiro Fujisaki, Tetsutaro Kobayashi, Hikaru Morita, Hiroaki Oguro, Tatsuaki Okamoto, Satomi Okazaki, David Pointcheval, Shigenori Uchiyama
9 Bit Permutation Instructions: Architecture, Implementation and Cryptographic Properties – Zhijie Jerry Shi - 2004
2 Towards a DL-based Additively Homomorphic Encryption Scheme – Guilhem Castagnos, BenoĆ®t Chevallier-mames
18 Efficient Electronic Cash: New Notions and Techniques – Yiannis S. Tsiounis - 1997
24 The Classification of Hash Functions – Ross Anderson - 1993
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
9 On the importance of securing your bins: The garbage-man-in-the-middle attack – Marc Joye, Jean-Jacques Quisquater - 1997