Cryptanalysis and protocol failures
Communications of the ACM
The design and implementation of tripwire: a file system integrity checker
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
How to break Gifford's cipher (extended abstract)
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
McEliece Public Key Cryptosystems Using Algebraic-Geometric Codes
Designs, Codes and Cryptography
Perfect Secret Sharing Schemes on Five Participants
Designs, Codes and Cryptography
A Construction for Multisecret Threshold Schemes
Designs, Codes and Cryptography
Tight Bounds on the Information Rate of Secret SharingSchemes
Designs, Codes and Cryptography
Access Control and Signatures via Quorum Secret Sharing
IEEE Transactions on Parallel and Distributed Systems
ID-based secret-key cryptography
ACM SIGOPS Operating Systems Review
Information Security, Mathematics, and Public-Key Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Improving A Solution's Quality Through Parallel Processing
The Journal of Supercomputing
Approaching Secure Communications in a Message-Oriented Mobile Computing Environment
Multimedia Tools and Applications
A Survey of Encryption Standards
IEEE Micro
Improved Digital Signature Suitable for Batch Verification
IEEE Transactions on Computers
An unlinkably divisible and intention attachable ticket scheme for runoff elections
Journal of Network and Computer Applications
On the balancedness of nonlinear generators of binary sequences
Information Processing Letters
A new key authentication scheme based on discrete logarithms
Applied Mathematics and Computation
Image Watermarking for Copyright Protection
ALENEX '99 Selected papers from the International Workshop on Algorithm Engineering and Experimentation
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of the Nonlinear FeedForward Generator
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Smartcards: Hot to Put them to Use in a User-Centric System
HUC '00 Proceedings of the 2nd international symposium on Handheld and Ubiquitous Computing
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Payment technologies for E-commerce
Neural Networks - 2003 Special issue: Advances in neural networks research IJCNN'03
A systematic approach for encryption and authentication with fault tolerance
Computer Networks: The International Journal of Computer and Telecommunications Networking
Message authentication by integrity with public corroboration
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Private stateful circuits secure against probing attacks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Application of FI sequences for authentication in a network
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
A survey of recent developments in cryptographic algorithms for smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application
ICCS '09 Proceedings of the 9th International Conference on Computational Science: Part I
An on-line electronic check system with mutual authentication
Computers and Electrical Engineering
Ownership-attached unblinding of blind signatures for untraceable electronic cash
Information Sciences: an International Journal
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Software performance of universal hash functions
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
On the number of equivalence classes in certain stream ciphers
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartIII
Hiding information in multi level security systems
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
ICONIP'08 Proceedings of the 15th international conference on Advances in neuro-information processing - Volume Part I
The use of mathematical linguistic methods in creating secret sharing threshold algorithms
Computers & Mathematics with Applications
Cryptography for network security: failures, successes and challenges
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
How secret-sharing can defeat terrorist fraud
Proceedings of the fourth ACM conference on Wireless network security
Generation of pseudorandom binary sequences with controllable cryptographic parameters
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part I
A deterministic approach to balancedness and run quantification in pseudorandom pattern generators
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
A simple acceptance/rejection criterium for sequence generators in symmetric cryptography
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Research note: Key authentication scheme for cryptosystems based on discrete logarithms
Computer Communications
Research note: An on-line secret sharing scheme for multi-secrets
Computer Communications
An efficient multi-receipt mechanism for uncoercible anonymous electronic voting
Mathematical and Computer Modelling: An International Journal
An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
Journal of Medical Systems
Hi-index | 0.02 |
From the Publisher:The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.