On rotation group and encryption of analog signals
Proceedings of CRYPTO 84 on Advances in cryptology
An LSI digital encryption processor (DEP)
Proceedings of CRYPTO 84 on Advances in cryptology
Efficient hardware implementation of the DES
Proceedings of CRYPTO 84 on Advances in cryptology
Proceedings of CRYPTO 84 on Advances in cryptology
Information theory without the finiteness assumption, I: Cryptosystems as group-theoretic objects
Proceedings of CRYPTO 84 on Advances in cryptology
Dependence of output on input in DES: small avalanche characteristics
Proceedings of CRYPTO 84 on Advances in cryptology
Two new secret key cryptosystems
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Propagation characteristics of the DES
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Discrete logarithms in finite fields and their cryptographic significance
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Structure in the S-boxes of the DES
Proceedings on Advances in cryptology---CRYPTO '86
Storing text retrieval systems on CD-ROM: compression and encryption considerations
ACM Transactions on Information Systems (TOIS)
Storing text retrieval systems on CD-ROM: compression and encryption considerations
SIGIR '89 Proceedings of the 12th annual international ACM SIGIR conference on Research and development in information retrieval
UNIX password security—ten years later
CRYPTO '89 Proceedings on Advances in cryptology
Practical problems with a cryptographic protection scheme (invited)
CRYPTO '89 Proceedings on Advances in cryptology
CRYPTO '89 Proceedings on Advances in cryptology
Communications of the ACM
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
Automated statistical methods for measuring the strength of block ciphers
Statistics and Computing
A Layered Approach to the Design of Private Key Cryptosystems
CRYPTO '85 Advances in Cryptology
Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences
CRYPTO '85 Advances in Cryptology
CRYPTO '85 Advances in Cryptology
The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with
CRYPTO '85 Advances in Cryptology
Information Theory Without the Finiteness Assumption, II: Unfolding the DES
CRYPTO '85 Advances in Cryptology
A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes
CRYPTO '85 Advances in Cryptology
Nonlinear Parity Circuits and their Cryptographic Applications
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Correlations in RC6 with a Reduced Number of Rounds
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
Design and study of a strong crypto-system model for e-Commerce
ICCC '02 Proceedings of the 15th international conference on Computer communication
On the feasibility of computing discrete logarithms using Adleman's subexponential algorithm
ACM SIGACT News - A special issue on cryptography
IBM Journal of Research and Development - Mathematics and computing
Data Integrty in Digital Optical Disks
IEEE Transactions on Computers
Maximum utilization of vehicle capacity: A case of MRO items
Computers and Industrial Engineering
On disclosure risk analysis of anonymized itemsets in the presence of prior knowledge
ACM Transactions on Knowledge Discovery from Data (TKDD)
Group theoretic properties of Rijndael-like ciphers
Discrete Applied Mathematics
IBM Journal of Research and Development
Enumerating nondegenerate permutations
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Some remarks on the cross correlation analysis of pseudo random generators
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Fast data encipherment algorithm FEAL
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
JEA K-128: a novel encryption algorithm using VHDL
WSEAS Transactions on Computers
Algorithms and theory of computation handbook
Complementation-Like and cyclic properties of AES round functions
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Hi-index | 0.03 |
From the Publisher:The first systematic development of the principles and technology underlying the disguising of text and computer data. Formulates the principles underlying encipherment, analyzes a number of basic systems including the ``Enigma machine,'' and treats applications to data processing: public key systems, electronic signatures, communication and file security.