Answers To Frequently Asked Questions About Today's Cryptography (1993)

Cached

Download Links

by Paul Fahn
Citations:9 - 0 self

Active Bibliography

Data Security - CM 0321 – Antonia J. Jones, Antonia J. Jones, Lecturer Antonia, J. Jones - 2001
MODULE: Data Security – Antonia J. Jones, Antonia J. Jones, Lecturer Antonia, J. Jones - 1996
Codes -- The Guide to Secrecy . . . – Richard A. Mollin
Cryptographic Primitives – Paul Garrett - 2007
1 Cryptology – Prof Ronald Rivest, L. Rivest
2 Survey of Computational Assumptions Used in Cryptography Broken or Not by Shor's Algorithm – Hong Zhu - 2001
A Cryptosystem Based on the Symmetric Group Sn – Javad N. Doliskani, Ehsan Malekian, Ali Zakerolhosseini
3 An Experience Teaching a Graduate Course in Cryptography – Aviel D. Rubin - 1997
unknown title – Foreword Whitfield Diffie
56 Twofish: A 128-Bit Block Cipher – Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson - 1998
1 PSEC: Provably Secure Elliptic Curve Encryption Scheme – Eiichiro Fujisaki, Tetsutaro Kobayashi, Hikaru Morita, Hiroaki Oguro, Tatsuaki Okamoto, Satomi Okazaki, David Pointcheval - 2000
7 PSEC: Provably Secure Elliptic Curve Encryption Scheme – Tatsuaki Okamoto, Eiichiro Fujisaki, Hikaru Morita - 2000
2 EPOC: Efficient Probabilistic Public-Key Encryption – Eiichiro Fujisaki, Tetsutaro Kobayashi, Hikaru Morita, Hiroaki Oguro, Tatsuaki Okamoto, Satomi Okazaki, David Pointcheval, Shigenori Uchiyama
9 Bit Permutation Instructions: Architecture, Implementation and Cryptographic Properties – Zhijie Jerry Shi - 2004
2 Towards a DL-based Additively Homomorphic Encryption Scheme – Guilhem Castagnos, BenoĆ®t Chevallier-mames
18 Efficient Electronic Cash: New Notions and Techniques – Yiannis S. Tsiounis - 1997
24 The Classification of Hash Functions – Ross Anderson - 1993
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
9 On the importance of securing your bins: The garbage-man-in-the-middle attack – Marc Joye, Jean-Jacques Quisquater - 1997