Cryptographic verification of test coverage claims
ESEC '97/FSE-5 Proceedings of the 6th European SOFTWARE ENGINEERING conference held jointly with the 5th ACM SIGSOFT international symposium on Foundations of software engineering
A Coding Approach for Detection of Tampering in Write-Once Optical Disks
IEEE Transactions on Computers
Efficient Multiplier Architectures for Galois Fields GF(24n)
IEEE Transactions on Computers
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Watermarking techniques for intellectual property protection
DAC '98 Proceedings of the 35th annual Design Automation Conference
Robust IP watermarking methodologies for physical design
DAC '98 Proceedings of the 35th annual Design Automation Conference
Authenticated group key agreement and friends
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Public-key cryptography and password protocols
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
How to prove where you are: tracking the location of customer equipment
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Intellectual property protection by watermarking combinational logic synthesis solutions
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design
Techniques for trusted software engineering
Proceedings of the 20th international conference on Software engineering
Fixing a problem in the Helsinki protocol
ACM SIGOPS Operating Systems Review
ID-based secret-key cryptography
ACM SIGOPS Operating Systems Review
Comparing lower bounds on messages and rounds for two classes of key establishment protocols
ACM SIGCOMM Computer Communication Review
High-confidence design for security: don't trust—verify
Communications of the ACM
Clarifying straight replays and forced delays
ACM SIGOPS Operating Systems Review
A generalized qth root algorithm
Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms
Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Using smartcards to secure a personalized gambling device
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Efficient verifiable encryption (and fair exchange) of digital signatures
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Public-key cryptography and password protocols
ACM Transactions on Information and System Security (TISSEC)
Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite Exponents
IEEE Transactions on Computers
Secrecy by typing in security protocols
Journal of the ACM (JACM)
Authentication primitives and their compilation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Factoring large numbers with programmable hardware
FPGA '00 Proceedings of the 2000 ACM/SIGDA eighth international symposium on Field programmable gate arrays
Unlinkable serial transactions: protocols and applications
ACM Transactions on Information and System Security (TISSEC)
Technical opinion: designing cryptography for the new century
Communications of the ACM
Complexity and Fast Algorithms for Multiexponentiations
IEEE Transactions on Computers
Cryptographic Verification of Test Coverage Claims
IEEE Transactions on Software Engineering
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
A Multi-agent system architecture for monitoring medical protocols
AGENTS '00 Proceedings of the fourth international conference on Autonomous agents
CNN Algorithms for Video Authentication and Copyright Protection
Journal of VLSI Signal Processing Systems - Special issue on spatiotemporal signal processing with analog CNN visual microprocessors
Localized watermarking: methodology and application to operation scheduling
ICCAD '99 Proceedings of the 1999 IEEE/ACM international conference on Computer-aided design
Information Security, Mathematics, and Public-Key Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Discrete Logarithms: The Past and the Future
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Efficient Arithmetic on Koblitz Curves
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Summary cache: a scalable wide-area web cache sharing protocol
IEEE/ACM Transactions on Networking (TON)
Optimal Left-to-Right Binary Signed-Digit Recoding
IEEE Transactions on Computers - Special issue on computer arithmetic
Crossroads
Comparative analysis of the DES cryptographic processor's architecture (abstract only)
CCU '00 Proceedings of the symposium on Contemporary computing in Ukraine
Funkspiel schemes: an alternative to conventional tamper resistance
Proceedings of the 7th ACM conference on Computer and communications security
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
Generalized Inversion Attack on Nonlinear Filter Generators
IEEE Transactions on Computers
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Managing Medical and Insurance Information Through a Smart-Card-Based Information System
Journal of Medical Systems
Mobile values, new names, and secure communication
POPL '01 Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis
IEEE Transactions on Computers
A new paradigm hidden in steganography
Proceedings of the 2000 workshop on New security paradigms
On pseudonymization of audit data for intrusion detection
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Something About All or Nothing (Transforms)
Designs, Codes and Cryptography
On the Use of RSA as a Secret Key Cryptosystem
Designs, Codes and Cryptography
Analysis of the Xedni Calculus Attack
Designs, Codes and Cryptography
Watermarking of SAT using combinatorial isolation lemmas
Proceedings of the 38th annual Design Automation Conference
Watermarking graph partitioning solutions
Proceedings of the 38th annual Design Automation Conference
Proceedings of the 38th annual Design Automation Conference
On String Replacement Exponentiation
Designs, Codes and Cryptography
Protection in programming-language translations
Secure Internet programming
Introducing trusted third parties to the mobile agent paradigm
Secure Internet programming
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Counting by quantum eigenvalue estimation
Theoretical Computer Science
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
IEEE Transactions on Computers
Secure password-based cipher suite for TLS
ACM Transactions on Information and System Security (TISSEC)
An unknown key-share attack on the MQV key agreement protocol
ACM Transactions on Information and System Security (TISSEC)
Twin signatures: an alternative to the hash-and-sign paradigm
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
A verifiable secret shuffle and its application to e-voting
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Securely combining public-key cryptosystems
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
FPGA test time reduction through a novel interconnect testing scheme
FPGA '02 Proceedings of the 2002 ACM/SIGDA tenth international symposium on Field-programmable gate arrays
On the validity of digital signatures
ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review
Blinded-key signatures: securing private keys embedded in mobile agents
Proceedings of the 2002 ACM symposium on Applied computing
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
A two-level time-stamping system
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Communication-efficient group key agreement
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves
Designs, Codes and Cryptography
Choosing reputable servents in a P2P network
Proceedings of the 11th international conference on World Wide Web
A lightweight protocol for the generation and distribution of secure e-coupons
Proceedings of the 11th international conference on World Wide Web
Improving A Solution's Quality Through Parallel Processing
The Journal of Supercomputing
Unlocking the design secrets of a 2.29 Gb/s Rijndael processor
Proceedings of the 39th annual Design Automation Conference
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Securing ad hoc services, a Jini view: extended abstract
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
A comparison of two approaches to pseudorandomness
Theoretical Computer Science
SAWM: a tool for secure and authenticated web metering
SEKE '02 Proceedings of the 14th international conference on Software engineering and knowledge engineering
On the Linear Complexity of the Naor–Reingold Pseudo-random Function from Elliptic Curves
Designs, Codes and Cryptography
Verifiable Partial Escrow of Integer Factors
Designs, Codes and Cryptography
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Proceedings of the 8th annual international conference on Mobile computing and networking
DoS and authentication in wireless public access networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Efficient tracing of failed nodes in sensor networks
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
Secure implementation of channel abstractions
Information and Computation
SPINS: security protocols for sensor networks
Wireless Networks
Comments on an optimized protocol for mobile network authentication and security
ACM SIGMOBILE Mobile Computing and Communications Review
A temporal key management scheme for secure broadcasting of XML documents
Proceedings of the 9th ACM conference on Computer and communications security
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
Taming access control security: extending capabilities using the views relationship
Software—Practice & Experience
A fast correlation attack on LILI-128
Information Processing Letters
A Signature Scheme Based on the Intractability of Computing Roots
Designs, Codes and Cryptography
Automated Software Engineering
Cryptography, trusted third parties and escrow
BT Technology Journal
Coalition Public-Key Cryptosystems
Cybernetics and Systems Analysis
Parallel stream cipher for secure high-speed communications
Signal Processing
On-line e-wallet system with decentralized credential keepers
Mobile Networks and Applications
Enabling trusted software integrity
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
On the Linear Complexity of the Power Generator
Designs, Codes and Cryptography
On the Security of the Digital Signature Algorithm
Designs, Codes and Cryptography
How to decrypt or even substitute DES-Encrypted messages in 228 steps
Information Processing Letters
A Pessimistic Approach to Trust in Mobile Agent Platforms
IEEE Internet Computing
Access Control and Session Management in the HTTP Environment
IEEE Internet Computing
Using Cryptographic and Watermarking Algorithms
IEEE MultiMedia
Protocols for Watermark Verification
IEEE MultiMedia
Computer
Security Domains: Key Management in Large-Scale Systems
IEEE Software
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
IEEE Transactions on Knowledge and Data Engineering
Computation of edit probabilities and edit distances for the A5-type Keystream generator
Journal of Complexity
An unlinkably divisible and intention attachable ticket scheme for runoff elections
Journal of Network and Computer Applications
On the linear complexity profile of explicit nonlinear pseudorandom numbers
Information Processing Letters
On the balancedness of nonlinear generators of binary sequences
Information Processing Letters
IEEE MultiMedia
Analysis of the Statistical Cipher Feedback Mode of Block Ciphers
IEEE Transactions on Computers
Quantum algorithms for some hidden shift problems
SODA '03 Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms
The Design of a COTSReal-Time Distributed Security Kernel
EDCC-4 Proceedings of the 4th European Dependable Computing Conference on Dependable Computing
Authentication Service Model Supporting Multiple Domains in Distributed Computing
ICCS '01 Proceedings of the International Conference on Computational Sciences-Part I
ISEC '01 Proceedings of the Second International Symposium on Topics in Electronic Commerce
On Reliable and Scalable Peer-to-Peer Web Document Sharing
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Scalable space/time-shared stream-processing on the run-time reconfigurable PCA architecture
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Formal Eavesdropping and Its Computational Interpretation
TACS '01 Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software
The Hidden Subgroup Problem and Eigenvalue Estimation on a Quantum Computer
QCQC '98 Selected papers from the First NASA International Conference on Quantum Computing and Quantum Communications
Practical Free-Space Quantum Cryptography
QCQC '98 Selected papers from the First NASA International Conference on Quantum Computing and Quantum Communications
WAIM '02 Proceedings of the Third International Conference on Advances in Web-Age Information Management
An Interactive Cryptanalysis Algorithm for the Vigenere Cipher
ADVIS '00 Proceedings of the First International Conference on Advances in Information Systems
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Generalised Cycling Attacks on RSA and Strong RSA Primes
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Conference Key Agreement from Secret Sharing
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
On the Symmetric Property of Homogeneous Boolean Functions
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Inversion Attack and Branching
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
On the Security of an RSA Based Encryption Scheme
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Elliptic Curve Cryptography on a Palm OS Device
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Signature Schemes Based on 3rd Order Shift Registers
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Note on Fast Computation of Secret RSA Exponents
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Authenticated Operation of Open Computing Devices
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Encrypting Java Archives and Its Application to Mobile Agent Security
Agent Mediated Electronic Commerce, The European AgentLink Perspective.
Loyalty Program Scheme for Anonymous Payment System
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Secure PC-Franking for Everyone
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
A Secure Electronic Software Distribution (ESD) Protocol Based on PKC
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
MIERA: Method for Inter-Enterprise Role-Based Authorization
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Flexible Authentication with Multiple Domains of Electronic Commerce
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Improving SSL Handshake Performance via Batching
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Analysis of SHA-1 in Encryption Mode
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Software Implementation of the NIST Elliptic Curves Over Prime Fields
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Secure Key-Evolving Protocols for Discrete Logarithm Schemes
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Efficient Cache Answerability for XPath Queries
Proceedings of the VLDB 2002 Workshop EEXTT and CAiSE 2002 Workshop DTWeb on Efficiency and Effectiveness of XML Tools and Techniques and Data Integration over the Web-Revised Papers
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
An ASIC Implementation of the AES SBoxes
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Known Plaintext Correlation Attack against RC5
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
RSA-Based Undeniable Signatures for General Moduli
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Montgomery in Practice: How to Do It More Efficiently in Hardware
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Mathematical Models of Computer Security
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
Optimistic Asynchronous Multi-party Contract Signing with Reduced Number of Rounds
ICALP '01 Proceedings of the 28th International Colloquium on Automata, Languages and Programming,
Online Advertising: Secure E-coupons
ICTCS '01 Proceedings of the 7th Italian Conference on Theoretical Computer Science
A Public Key Cryptosystem Based on the Subgroup Membership Problem
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Primitive Polynomials over GF(2) - A Cryptologic Approach
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A Cyclic Window Algorithm for ECC Defined over Extension Fields
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A New Statistical Testing for Symmetric Ciphers and Hash Functions
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Fast Elliptic Curve Multiplications with SIMD Operations
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
The Risks of Compromising Secret Information
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Further Results on Multiples of Primitive Polynomials and Their Products over GF(2)
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Cryptanalysis of the Reduced-Round RC6
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Message Authentication Codes with Error Correcting Capabilities
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
A Secure Agent-Mediated Payment Protocol
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Hash to the Rescue: Space Minimization for PKI Directories
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
A Multi-party Optimistic Non-repudiation Protocol
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Design of an Authentication Protocol for Gsm Javacards
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machine
SAC '98 Proceedings of the Selected Areas in Cryptography
Authenticated Diffie-Hellman Key Agreement Protocols
SAC '98 Proceedings of the Selected Areas in Cryptography
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Improving and Extending the Lim/Lee Exponentiation Algorithm
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Modes of Operation of Stream Ciphers
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Fast Multiplication of Integers for Public-Key Applications
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Linear Codes in Constructing Resilient Functions with High Nonlinearity
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Algorithms for Multi-exponentiation
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
On the Security of CTR + CBC-MAC
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
A New Version of the Stream Cipher SNOW
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q)
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Hyper-Encryption and Everlasting Security
STACS '02 Proceedings of the 19th Annual Symposium on Theoretical Aspects of Computer Science
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Polynomial Interpolation of the Elliptic Curve and XTR Discrete Logarithm
COCOON '02 Proceedings of the 8th Annual International Conference on Computing and Combinatorics
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
On the Security of RSA Padding
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Public Key Traitor Tracing Scheme
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Oblivious Transfer with Adaptive Queries
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Fast Correlation Attacks Based on Turbo Code Techniques
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
L-collision Attacks against Randomized MACs
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Fast Correlation Attacks through Reconstruction of Linear Polynomials
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Provably Secure Partially Blind Signatures
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
New Public Key Cryptosystem Using Finite Non Abelian Groups
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Session-Key Generation Using Human Passwords Only
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
An Efficient Scheme for Proving a Shuffle
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
On the Security of RSA Encryption in TLS
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Security Analysis of IKE's Signature-Based Key-Exchange Protocol
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Security Proof for Partial-Domain Hash Signature Schemes
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
Secrecy Types for Asymmetric Communication
FoSSaCS '01 Proceedings of the 4th International Conference on Foundations of Software Science and Computation Structures
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
A Top-Down Look at a Secure Message
Proceedings of the 19th Conference on Foundations of Software Technology and Theoretical Computer Science
SOFSEM '98 Proceedings of the 25th Conference on Current Trends in Theory and Practice of Informatics: Theory and Practice of Informatics
Feature Extraction and a Database Strategy for Video Fingerprinting
VISUAL '02 Proceedings of the 5th International Conference on Recent Advances in Visual Information Systems
Does Encryption with Redundancy Provide Authenticity?
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
NSS: An NTRU Lattice-Based Signature Scheme
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS ...
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Generating RSA Keys on a Handheld Using an Untrusted Server
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Universally Composable Notions of Key Exchange and Secure Channels
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
High-Speed Software Multiplication in F2m
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
A Twin Algorithm for Efficient Generation of Digital Signatures
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Re-dividing Complexity between Algorithms and Keys
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Efficient Software Implementation of Linear Feedback Shift Registers
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Modular Multiplication in GF(pk) Using Lagrange Representation
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Identity Based Authenticated Group Key Agreement Protocol
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Cryptanalysis of the Yi-Lam Hash
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Mix and Match: Secure Function Evaluation via Ciphertexts
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Security of Signed ElGamal Encryption
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Attacking and Repairing Batch Verification Schemes
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Why Textbook ElGamal and RSA Encryption Are Insecure
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Addition of ElGamal Plaintexts
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Unbelievable Security. Matching AES Security Using Public Key Systems
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On the Insecurity of a Server-Aided RSA Protocol
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Probable Prime Test with Very High Confidence for n equiv 1 mod 4
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On Unconditionally Secure Robust Distributed Key Distribution Centers
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Threshold Cryptosystems Based on Factoring
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption
Proceedings of the 11th USENIX Security Symposium
On P Systems with Active Membranes Solving the Integer Factorization Problem in a Polynomial Time
WMP '00 Proceedings of the Workshop on Multiset Processing: Multiset Processing, Mathematical, Computer Science, and Molecular Computing Points of View
Virtual Software Tokens - A Practical Way to Secure PKI Roaming
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Informatics - 10 Years Back. 10 Years Ahead.
Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature
SAFECOMP '99 Proceedings of the 18th International Conference on Computer Computer Safety, Reliability and Security
Improvements in Process Control Dependability through Internet Security Technology
SAFECOMP '00 Proceedings of the 19th International Conference on Computer Safety, Reliability and Security
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
The State of Cryptographic Hash Functions
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Provably Secure Implicit Certificate Schemes
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Improving the Effectiveness of Web Caching
Advances in Distributed Systems, Advanced Distributed Computing: From Algorithms to Systems
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Securing Internet Electronic Mail
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Elliptic Curve Public-Key Cryptosystems - An Introduction
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Recent Developments in the Design of Conventional Cryptographic Algorithms
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Cryptographic Primitives for Information Authentication - State of the Art
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Efficient Trace and Revoke Schemes
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Intellectual Property Metering
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
MA '01 Proceedings of the 5th International Conference on Mobile Agents
A Scalable and Secure Global Tracking Service for Mobile Agents
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Empowering Mobile Software Agents
MA '02 Proceedings of the 6th International Conference on Mobile Agents
New Iterative Geometric Methods for Robust Perceptual Image Hashing
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
A Method for Protecting Mobile Agents against Denial of Service Attacks
CIA '02 Proceedings of the 6th International Workshop on Cooperative Information Agents VI
8 Gigabits per Second Implementation of the IDEA Cryptographic Algorithm
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
A Cryptanalytic Time-Memory Tradeoff: First FPGA Implementation
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
An FPGA Based SHA-256 Processor
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
New Constructions for Secure Hash Functions
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Fast Correlation Attack Algorithm with List Decoding and an Application
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions
Proceedings of the 7th IMA International Conference on Cryptography and Coding
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Proceedings of the 8th IMA International Conference on Cryptography and Coding
A New Undeniable Signature Scheme Using Smart Cards
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Another Way of Doing RSA Cryptography in Hardware
Proceedings of the 8th IMA International Conference on Cryptography and Coding
An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
Non-interactive Cryptosystem for Entity Authentication
ISW '99 Proceedings of the Second International Workshop on Information Security
Classification of Authentication Protocols: A Practical Approach
ISW '00 Proceedings of the Third International Workshop on Information Security
An Efficient Protocol for Certified Electronic Mail
ISW '00 Proceedings of the Third International Workshop on Information Security
Weighted One-Way Hash Chain and Its Applications
ISW '00 Proceedings of the Third International Workshop on Information Security
Performance Analysis of Secure Web Server Based on SSL
ISW '00 Proceedings of the Third International Workshop on Information Security
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator
ISC '01 Proceedings of the 4th International Conference on Information Security
Lenient/Strict Batch Verification in Several Groups
ISC '01 Proceedings of the 4th International Conference on Information Security
Elliptic Curve Arithmetic Using SIMD
ISC '01 Proceedings of the 4th International Conference on Information Security
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512
ISC '02 Proceedings of the 5th International Conference on Information Security
A Distributed and Computationally Secure Key Distribution Scheme
ISC '02 Proceedings of the 5th International Conference on Information Security
ISC '02 Proceedings of the 5th International Conference on Information Security
An Efficient Dynamic and Distributed Cryptographic Accumulator
ISC '02 Proceedings of the 5th International Conference on Information Security
Message Recovery Fair Blind Signature
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
A Secure Pay-per View Scheme for Web-Based Video Service
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Hash Functions and the MAC Using All-or-Nothing Property
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Encrypted Message Authentication by Firewalls
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
New Key Recovery in WAKE Protocol
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
On the Security of Lenstra's Variant of DSA without Long Inversions
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
A Combined Timing and Power Attack
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
RSA Key Generation with Verifiable Randomness
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Solving Underdefined Systems of Multivariate Quadratic Equations
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
New Minimal Modified Radix-r Representation with Applications to Smart Cards
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Round-Optimal Contributory Conference Key Agreement
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Smooth Orders and Cryptographic Applications
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Factoring N = pq with the Elliptic Curve Method
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
NICE - New Ideal Coset Encryption
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
A Timing Attack against RSA with the Chinese Remainder Theorem
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
MiniPASS: Authentication and Digital Signatures in a Constrained Environment
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Efficient Generation of Prime Numbers
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Software Implementation of Elliptic Curve Cryptography over Binary Fields
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Efficient Implementation of "Large" Stream Cipher Systems
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
High Performance Single-Chip FPGA Rijndael Algorithm Implementations
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Dual-Field Arithmetic Unit for GF(p) and GF(2m)
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
True Random Number Generator Embedded in Reconfigurable Hardware
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Increasing the Bitlength of a Crypto-Coprocessor
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Genus Two Hyperelliptic Curve Coprocessor
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
The Two Faces of Lattices in Cryptology
CaLC '01 Revised Papers from the International Conference on Cryptography and Lattices
The Insecurity of Nyberg-Rueppel and Other DSA-Like Signature Schemes with Partially Known Nonces
CaLC '01 Revised Papers from the International Conference on Cryptography and Lattices
Secure Transport of Authentication Data in Third Generation Mobile Phone Networks
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Simplified OAEP for the RSA and Rabin Functions
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Efficient Parallel Modular Exponentiation Algorithm
ADVIS '02 Proceedings of the Second International Conference on Advances in Information Systems
Estimating the Scalability of the Internet Key Exchange
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
IDEA: A Cipher For Multimedia Architectures?
SAC '98 Proceedings of the Selected Areas in Cryptography
The GH Public-Key Cryptosystem
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Postal Revenue Collection in the Digital Age
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Rijndael FPGA Implementations Utilising Look-Up Tables
Journal of VLSI Signal Processing Systems
IEEE Transactions on Computers
A Scalable Dual-Field Elliptic Curve Cryptographic Processor
IEEE Transactions on Computers
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis
IEEE Transactions on Computers
Multiparty authentication services and key agreement protocols with semi-trusted third party
Journal of Computer Science and Technology
Secrecy types for asymmetric communication
Theoretical Computer Science - Foundations of software science and computation structures
Security of the most significant bits of the Shamir message passing scheme
Mathematics of Computation
Some baby-step giant-step algorithms for the low hamming weight discrete logarithm problem
Mathematics of Computation
Energy-aware design techniques for differential power analysis protection
Proceedings of the 40th annual Design Automation Conference
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Journal of Systems Architecture: the EUROMICRO Journal
A Super-Serial Galois Fields Multiplier for FPGAs and its Application to Public-Key Algorithms
FCCM '99 Proceedings of the Seventh Annual IEEE Symposium on Field-Programmable Custom Computing Machines
FPGA Implementation of a Microcoded Elliptic Curve Cryptographic Processor
FCCM '00 Proceedings of the 2000 IEEE Symposium on Field-Programmable Custom Computing Machines
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
One-way trap door functions based on the Boolean satisfiability problem
ICCC '02 Proceedings of the 15th international conference on Computer communication
Security in computer communication using chaotic cryptography
ICCC '02 Proceedings of the 15th international conference on Computer communication
Scalable threshold scheme without a trusted third party
ICCC '02 Proceedings of the 15th international conference on Computer communication
ICCC '02 Proceedings of the 15th international conference on Computer communication
Small worlds in security systems: an analysis of the PGP certificate graph
Proceedings of the 2002 workshop on New security paradigms
Farsite: federated, available, and reliable storage for an incompletely trusted environment
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
DISEC: A Distributed Framework for Scalable Secure Many-to-Many Communication
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Hardware architectures for public key cryptography
Integration, the VLSI Journal
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Proceedings of the twenty-second annual symposium on Principles of distributed computing
A public-key based authentication and key establishment protocol coupled with a client puzzle
Journal of the American Society for Information Science and Technology
Exploring Robustness in Group Key Agreement
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Payment technologies for E-commerce
Secure electronic transactions: overview, capabilities, and current status
Payment technologies for E-commerce
Scalable web page entanglement
The New Review of Hypermedia and Multimedia - Hypermedia and the world wide web
Statistical properties and implementation of aperiodic pseudorandom number generators
Applied Numerical Mathematics - Special issue: Applied numerical computing: Grid generation and solution methods for advanced simulations
The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces
Designs, Codes and Cryptography
Threshold signature scheme using self-certified public keys
Journal of Systems and Software
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution
ICDAR '03 Proceedings of the Seventh International Conference on Document Analysis and Recognition - Volume 2
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Protecting Java component integrity against Trojan Horse programs
Integrity and internal control in information systems V
Designs, Codes and Cryptography
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Empirical evidence concerning AES
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Random small hamming weight products with applications to cryptography
Discrete Applied Mathematics - Special issue on the 2000 com2MaC workshop on cryptography
Computing discrete logarithms with the parallelized kangaroo method
Discrete Applied Mathematics - Special issue on the 2000 com2MaC workshop on cryptography
Print signatures for document authentication
Proceedings of the 10th ACM conference on Computer and communications security
Automatic generation of two-party computations
Proceedings of the 10th ACM conference on Computer and communications security
Secret key distribution protocol using public key cryptography
Journal of Computing Sciences in Colleges
Irreducible trinomials over finite fields
Mathematics of Computation
Secure hybrid robust watermarking resistant against tampering and copy attack
Signal Processing - Special section: Security of data hiding technologies
Correlation Analysis of the Alternating Step Generator
Designs, Codes and Cryptography
Delay-based circuit authentication and applications
Proceedings of the 2003 ACM symposium on Applied computing
A flexible and scalable authentication scheme for JPEG2000 image codestreams
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
Untraceable blind signature schemes based on discrete logarithm problem
Fundamenta Informaticae
A scalable key-management scheme with minimizing key storage for secure group communications
International Journal of Network Management
Some attacks upon authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW14
On scalable and locality-aware web document sharing
Journal of Parallel and Distributed Computing - Scalable web services and architecture
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders
Designs, Codes and Cryptography
On the security of cryptosystem using automorphism groups
Information Processing Letters
Cryptography and cryptographic protocols
Distributed Computing - Papers in celebration of the 20th anniversary of PODC
Encryption using two-dimensional cellular automata with applications
Artificial intelligence and security in computing systems
On automatic secret generation and sharing for Karin-Greene-Hellman scheme
Artificial intelligence and security in computing systems
The FSR-255 family of hash functions with a variable length of hash result
Artificial intelligence and security in computing systems
An embedded true random number generator for FPGAs
FPGA '04 Proceedings of the 2004 ACM/SIGDA 12th international symposium on Field programmable gate arrays
Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware
Proceedings of the conference on Design, automation and test in Europe - Volume 3
On the Computation of Square Roots in Finite Fields
Designs, Codes and Cryptography
Protecting information by means of the remainders theorem
CompSysTech '03 Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning
Anonymous coursework submission
CompSysTech '03 Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning
Defining security services for electronic tendering
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Secure Group Communication Using Robust Contributory Key Agreement
IEEE Transactions on Parallel and Distributed Systems
Verifiable encryption of digital signatures and applications
ACM Transactions on Information and System Security (TISSEC)
Crypto-based identifiers (CBIDs): Concepts and applications
ACM Transactions on Information and System Security (TISSEC)
Modeling and evaluating the security threats of transient errors in firewall software
Performance Evaluation - Dependable systems and networks-performance and dependability symposium (DSN-PDS) 2002: Selected papers
Secure object identification: or: solving the Chess Grandmaster Problem
Proceedings of the 2003 workshop on New security paradigms
Identity certified authentication for ad-hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity
IEEE Transactions on Computers
A Full RNS Implementation of RSA
IEEE Transactions on Computers
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
ANSS '04 Proceedings of the 37th annual symposium on Simulation
Toward an automated verification of certificates of authenticity
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
An FPGA implementation of an elliptic curve processor GF(2m)
Proceedings of the 14th ACM Great Lakes symposium on VLSI
Security issues in ad hoc networks
The handbook of ad hoc wireless networks
Journal of Complexity - Special issue on coding and cryptography
On the linear complexity profile of some new explicit inversive pseudorandom numbers
Journal of Complexity - Special issue on coding and cryptography
Group Key Agreement Efficient in Communication
IEEE Transactions on Computers
Fair blind threshold signatures in wallet with observers
Journal of Systems and Software
Adaptive incremental checkpointing for massively parallel systems
Proceedings of the 18th annual international conference on Supercomputing
The role of cryptography in database security
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Trustworthy 100-year digital objects: Evidence after every witness is dead
ACM Transactions on Information Systems (TOIS)
Reducing radio energy consumption of key management protocols for wireless sensor networks
Proceedings of the 2004 international symposium on Low power electronics and design
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
Elliptic and hyperelliptic curves on embedded μP
ACM Transactions on Embedded Computing Systems (TECS)
Security on FPGAs: State-of-the-art implementations and attacks
ACM Transactions on Embedded Computing Systems (TECS)
An HMAC processor with integrated SHA-1 and MD5 algorithms
Proceedings of the 2004 Asia and South Pacific Design Automation Conference
SPV: secure path vector routing for securing BGP
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Attack on a concast signature scheme
Information Processing Letters - Devoted to the rapid publication of short contributions to information processing
Cellular automata computations and secret key cryptography
Parallel Computing - Special issue: Parallel and nature-inspired computational paradigms and applications
Practical server privacy with secure coprocessors
IBM Systems Journal - End-to-end security
An architecture for the internet key exchange protocol
IBM Systems Journal - End-to-end security
P2P Scrabble. Can P2P Games Commence?
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
SeAl: Managing Accesses and Data in Peer-to-Peer Sharing Networks
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Parallel Cryptographic Arithmetic Using a Redundant Montgomery Representation
IEEE Transactions on Computers
Journal of Parallel and Distributed Computing - Special issue on middleware
On perfect secret sharing schemes and coalitional game forms
TARK '01 Proceedings of the 8th conference on Theoretical aspects of rationality and knowledge
A DRM security architecture for home networks
Proceedings of the 4th ACM workshop on Digital rights management
Electronic Commerce Research
Cryptographically Generated Addresses for Constrained Devices*
Wireless Personal Communications: An International Journal
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
Wireless Personal Communications: An International Journal
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
Identity-Based Fault-Tolerant Conference Key Agreement
IEEE Transactions on Dependable and Secure Computing
A Hardware-Software Platform for Intrusion Prevention
Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture
The construction of secure mobile agents via evaluating encrypted functions
Web Intelligence and Agent Systems
ssmail: Opportunistic Encryption in sendmail
LISA '99 Proceedings of the 13th USENIX conference on System administration
Theoretical Computer Science - Special issue: Foundations of wide area network computing
On the uniformity of distribution of the decryption exponent in fixed encryption exponent RSA
Information Processing Letters
IEEE Transactions on Computers
Formal prototyping in early stages of protocol design
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Authenticated key agreement in dynamic peer groups
Theoretical Computer Science
DHTTP: an efficient and cache-friendly transfer protocol for the web
IEEE/ACM Transactions on Networking (TON)
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Global identification of storage objects in network attached storage
CompSysTech '04 Proceedings of the 5th international conference on Computer systems and technologies
Designs, Codes and Cryptography
Generic Groups, Collision Resistance, and ECDSA
Designs, Codes and Cryptography
Analysis of Liberty Single-Sign-on with Enabled Clients
IEEE Internet Computing
Implementation of the SHA-2 Hash Family Standard Using FPGAs
The Journal of Supercomputing
An Instruction-Level Distributed Processor for Symmetric-Key Cryptography
IEEE Transactions on Parallel and Distributed Systems
Modified Alternating$$\vec{k}$$--generators
Designs, Codes and Cryptography
Protecting cryptographic keys and computations via virtual secure coprocessing
ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA)
Information Processing Letters
Elliptic curve cryptography: Java implementation
Proceedings of the 1st annual conference on Information security curriculum development
A cryptography course for non-mathematicians
Proceedings of the 1st annual conference on Information security curriculum development
Farsite: federated, available, and reliable storage for an incompletely trusted environment
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
An abuse-free fair contract signing protocol based on the RSA signature
WWW '05 Proceedings of the 14th international conference on World Wide Web
Moderately hard, memory-bound functions
ACM Transactions on Internet Technology (TOIT)
Theoretical Computer Science
A novel encryption algorithm for high resolution video
NOSSDAV '05 Proceedings of the international workshop on Network and operating systems support for digital audio and video
A ZKP-based identification scheme for base nodes in wireless sensor networks
Proceedings of the 2005 ACM symposium on Applied computing
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Architecture for Protecting Critical Secrets in Microprocessors
Proceedings of the 32nd annual international symposium on Computer Architecture
IEEE Transactions on Computers
An Identity Based Encryption system
Proceedings of the 3rd international symposium on Principles and practice of programming in Java
A Public Key Cryptosystem Based On A Subgroup Membership Problem
Designs, Codes and Cryptography
A secure and scalable group key exchange system
Information Processing Letters
Encyclopedia of Computer Science
An efficient high quality random number generator for multi-programmed systems
Journal of Computer Security
Secure Software Development by Example
IEEE Security and Privacy
A DoS-limiting network architecture
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs
Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Privacy enhanced cellular access security
Proceedings of the 4th ACM workshop on Wireless security
Security as a safety issue in rail communications
SCS '03 Proceedings of the 8th Australian workshop on Safety critical systems and software - Volume 33
DRM, trusted computing and operating system architecture
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
Enabling the Archival Storage of Signed Documents
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
Awarded Best Paper! - Venti: A New Approach to Archival Data Storage
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
High-level synthesis for large bit-width multipliers on FPGAs: a case study
CODES+ISSS '05 Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
A method for symbolic analysis of security protocols
Theoretical Computer Science
A new approach to scalable and fault-tolerant group key management protocols
Journal of High Speed Networks
Highly Nonlinear Resilient Functions Through Disjoint Codes in Projective Spaces
Designs, Codes and Cryptography
Application of synchronous dynamic encryption system in mobile wireless domains
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Remote timing attacks are practical
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Plutus: Scalable Secure File Sharing on Untrusted Storage
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods
IEEE Transactions on Computers
Secure Spread: An Integrated Architecture for Secure Group Communication
IEEE Transactions on Dependable and Secure Computing
Threshold circuit lower bounds on cryptographic functions
Journal of Computer and System Sciences
Integrating Portable and Distributed Storage
FAST '04 Proceedings of the 3rd USENIX Conference on File and Storage Technologies
IEEE Transactions on Computers
Solving Vector Consensus with a Wormhole
IEEE Transactions on Parallel and Distributed Systems
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
Improving Brumley and Boneh timing attack on unprotected SSL implementations
Proceedings of the 12th ACM conference on Computer and communications security
Secure off-the-record messaging
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Establishing and protecting digital identity in federation systems
Proceedings of the 2005 workshop on Digital identity management
Securing distributed storage: challenges, techniques, and systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
Toward securing untrusted storage without public-key operations
Proceedings of the 2005 ACM workshop on Storage security and survivability
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems
IEEE Transactions on Computers
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
A proposed curriculum of cryptography courses
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Data Integration for Medical Information Management
Journal of VLSI Signal Processing Systems
Some Observations on the Theory of Cryptographic Hash Functions
Designs, Codes and Cryptography
A New Type of Attacks on Block Ciphers
Problems of Information Transmission
Fighting entity authentication frauds by combining different technologies
BT Technology Journal
A Security Analysis of the Internet Chess Club
IEEE Security and Privacy
Node Cooperation in Hybrid Ad Hoc Networks
IEEE Transactions on Mobile Computing
A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols
IEEE Transactions on Mobile Computing
A compact FPGA implementation of the hash function whirlpool
Proceedings of the 2006 ACM/SIGDA 14th international symposium on Field programmable gate arrays
Secure distributed constraint satisfaction: reaching agreement without revealing private information
Artificial Intelligence - Special issue: Distributed constraint satisfaction
Certifying authenticity via fiber-infused paper
ACM SIGecom Exchanges
A-Codes from Rational Functions over Galois Rings
Designs, Codes and Cryptography
Speeding up Exponentiation using an Untrusted Computational Resource
Designs, Codes and Cryptography
Teaching cryptography in an applied computing program
Journal of Computing Sciences in Colleges
Improving secure server performance by re-balancing SSL/TLS handshakes
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Publicly verifiable ownership protection for relational databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Self-organised group key management for ad hoc networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Proceedings of the conference on Design, automation and test in Europe: Proceedings
A cost-effective encryption scheme for color images
Real-Time Imaging - Special issue on multi-dimensional image processing
Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security
The Journal of Supercomputing
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
Information Processing Letters
An Efficient Key Revocation Protocol for Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Analysis of non-linear pseudo-noise sequences
Enhanced methods in computer security, biometric and artificial intelligence systems
Secure data transimission via modulation of the chaotic sequence parameters
Enhanced methods in computer security, biometric and artificial intelligence systems
Key management and delayed verification for ad hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Proceedings of the 2006 ACM symposium on Applied computing
Symmetric key based authenticated querying in wireless sensor networks
InterSense '06 Proceedings of the first international conference on Integrated internet ad hoc and sensor networks
Security analysis of a password-based authentication protocol proposed to IEEE 1363
Theoretical Computer Science
On linear complexity of sequences over GF(2n)
Theoretical Computer Science
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
Theoretical Computer Science
High security Iris verification system based on random secret integration
Computer Vision and Image Understanding
Location-aware key establishment in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
An introduction to quantum cryptography
Crossroads
High-Speed FPGA Implementation of Secure Hash Algorithm for IPSec and VPN Applications
The Journal of Supercomputing
A derivation system and compositional logic for security protocols
Journal of Computer Security
Message authentication by integrity with public corroboration
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
A parallelized way to provide data encryption and integrity checking on a processor-memory bus
Proceedings of the 43rd annual Design Automation Conference
Itinerant delivery of popular data via WIDE hot spots
Mobile Networks and Applications
Authentication and integrity in outsourced databases
ACM Transactions on Storage (TOS)
A cryptography core tolerant to DFA fault attacks
SBCCI '06 Proceedings of the 19th annual symposium on Integrated circuits and systems design
On the impossibility of building secure cliques-type authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW17
On the k-error linear complexity over $$\mathbb{F}_p$$ of Legendre and Sidelnikov sequences
Designs, Codes and Cryptography
On the security of stepwise triangular systems
Designs, Codes and Cryptography
Low complexity Byzantine-resilient consensus
Distributed Computing
Formal analysis of secure contracting protocol for e-tendering
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
IEEE Transactions on Computers
Improvement to Montgomery Modular Inverse Algorithm
IEEE Transactions on Computers
IEEE Transactions on Mobile Computing
Block cipher based on reversible cellular automata
New Generation Computing - Evolutionary computation
Secure evolvable hardware for public-key cryptosystems
New Generation Computing - Evolutionary computation
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Location privacy in wireless personal area networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Securing wireless systems via lower layer enforcements
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Foundations of cryptography: a primer
Foundations and Trends® in Theoretical Computer Science
Discrete Applied Mathematics - Special issue: Coding and cryptography
A Framework for Describing Block Cipher Cryptanalysis
IEEE Transactions on Computers
IEEE Transactions on Pattern Analysis and Machine Intelligence
Password-based authentication and key distribution protocols with perfect forward secrecy
Journal of Computer and System Sciences
On countering online dictionary attacks with login histories and humans-in-the-loop
ACM Transactions on Information and System Security (TISSEC)
Framework for malware resistance metrics
Proceedings of the 2nd ACM workshop on Quality of protection
Modelling the relative strength of security protocols
Proceedings of the 2nd ACM workshop on Quality of protection
Using group signatures for identity management and its implementation
Proceedings of the second ACM workshop on Digital identity management
Seven cardinal properties of sensor network broadcast authentication
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
The design of composite permutations with applications to DES-like S-boxes
Designs, Codes and Cryptography
Low-Weight Polynomial Form Integers for Efficient Modular Multiplication
IEEE Transactions on Computers
A Bayesian Network Approach to Detecting Privacy Intrusion
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Authentication Control Point and Its Implications For Secure Processor Design
Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture
Results on multiples of primitive polynomials and their products over GF(2)
Theoretical Computer Science
Performance analysis of a denial of service protection scheme for optimized and QoS-aware handover
Computer Networks: The International Journal of Computer and Telecommunications Networking - Selected papers from the European wireless 2004 conference
Privacy Enhanced Mobile Authentication
Wireless Personal Communications: An International Journal
On-Chip Communication Architectures: System on Chip Interconnect
On-Chip Communication Architectures: System on Chip Interconnect
A review of information security issues and respective research contributions
ACM SIGMIS Database
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
A synthesizable datapath-oriented embedded FPGA fabric
Proceedings of the 2007 ACM/SIGDA 15th international symposium on Field programmable gate arrays
Attacking elliptic curve cryptosystems with special-purpose hardware
Proceedings of the 2007 ACM/SIGDA 15th international symposium on Field programmable gate arrays
Design of multicast protocols robust against inflated subscription
IEEE/ACM Transactions on Networking (TON)
A novel image-hiding scheme based on block difference
Pattern Recognition
A three round authenticated group key agreement protocol for ad hoc networks
Pervasive and Mobile Computing
Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol
Computer Communications
Portable security transaction protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
A novel key agreement protocol based on chaotic maps
Information Sciences: an International Journal
MoRVAM: A reverse Vickrey auction system for mobile commerce
Expert Systems with Applications: An International Journal
Robust self-keying mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analysis of security problems in a medical image encryption system
Computers in Biology and Medicine
Worm-IT - A wormhole-based intrusion-tolerant group communication system
Journal of Systems and Software
An area-efficient bit-serial integer and GF(2n) multiplier
Microelectronic Engineering
Multi-mode operator for SHA-2 hash functions
Journal of Systems Architecture: the EUROMICRO Journal
Scalable hardware implementing high-radix Montgomery multiplication algorithm
Journal of Systems Architecture: the EUROMICRO Journal
Exploring confusion in product ciphers through regression analysis
Information Sciences: an International Journal
Storing and retrieving XPath fragments in structured P2P networks
Data & Knowledge Engineering - Special issue: WIDM 2004
LIPS: a lightweight permit system for packet source origin accountability
Computer Networks: The International Journal of Computer and Telecommunications Networking
Kleptographic attacks on a cascade of mix servers
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Protecting RFID communications in supply chains
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
M-TREE: a high efficiency security architecture for protecting integrity and privacy of software
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
HW/SW co-design of a hyperelliptic curve cryptosystem using a microcode instruction set coprocessor
Integration, the VLSI Journal - Special issue: Embedded cryptographic hardware
Note: Generalized hyper-bent functions over GF(p)
Discrete Applied Mathematics
Dynamic differential self-timed logic families for robust and low-power security ICs
Integration, the VLSI Journal
D-cash: A flexible pre-paid e-cash scheme for date-attachment
Electronic Commerce Research and Applications
Secure route structures for parallel mobile agents based systems using fast binary dispatch
Mobile Information Systems
Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks
Computer Standards & Interfaces
Meaningful electronic signatures based on an automatic indexing method
Artificial Intelligence and Law
Study of chaos functions for their suitability in generating Message Authentication Codes
Applied Soft Computing
Secure set intersection cardinality with application to association rule mining
Journal of Computer Security
Establishing and protecting digital identity in federation systems
Journal of Computer Security - The First ACM Workshop on Digital Identity Management -- DIM 2005
A unified model for unconditionally secure key distribution
Journal of Computer Security
SERGEANT: A framework for building more flexible web agents by exploiting a search engine
Web Intelligence and Agent Systems
Jebelean--Weber's algorithm without spurious factors
Information Processing Letters
A survey of recent developments in cryptographic algorithms for smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Accelerating memory decryption and authentication with frequent value prediction
Proceedings of the 4th international conference on Computing frontiers
Consistency-preserving caching of dynamic database content
Proceedings of the 16th international conference on World Wide Web
Improving authentication of remote card transactions with mobile personal trusted devices
Computer Communications
Decoding interleaved Reed-Solomon codes over noisy channels
Theoretical Computer Science
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy
Journal of Systems and Software
Improving mobile database access over wide-area networks without degrading consistency
Proceedings of the 5th international conference on Mobile systems, applications and services
A fast pipelined multi-mode DES architecture operating in IP representation
Integration, the VLSI Journal
New techniques for ensuring the long term integrity of digital archives
dg.o '07 Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains
Public Authentication of 3D Mesh Models
WI '06 Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence
Security analysis of smartcard to card reader communications for biometric cardholder authentication
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
How to build a trusted database system on untrusted storage
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Dos and don'ts of client authentication on the web
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Remote timing attacks are practical
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
A new two-server approach for authentication with short secrets
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Brute force attack on UNIX passwords with SIMD computer
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
NOC-centric Security of Reconfigurable SoC
NOCS '07 Proceedings of the First International Symposium on Networks-on-Chip
Double Point Compression with Applications to Speeding Up Random Point Multiplication
IEEE Transactions on Computers
A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution
IEEE Transactions on Dependable and Secure Computing
Journal of VLSI Signal Processing Systems
High-speed & Low Area Hardware Architectures of the Whirlpool Hash Function
Journal of VLSI Signal Processing Systems
Fast Lagrange--Newton transformations
Journal of Complexity
Compact hardware design of Whirlpool hashing core
Proceedings of the conference on Design, automation and test in Europe
Provably secure authenticated group Diffie-Hellman key exchange
ACM Transactions on Information and System Security (TISSEC)
On the power of simple branch prediction analysis
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Feasibility of smart cards in silicon-on-insulator (SOI) technology
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Lightweight security primitives for E-Commerce
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Cryptographic support for secure logs on untrusted machines
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Software generation of practically strong random numbers
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Dos and don'ts of client authentication on the web
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
On the design of error-correcting ciphers
EURASIP Journal on Wireless Communications and Networking
SeGrid: a secure grid framework for sensor networks
EURASIP Journal on Wireless Communications and Networking
Pseudorandom number generation on the GPU
GH '06 Proceedings of the 21st ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware
A unified and reconfigurable Montgomery Multiplier architecture without four-to-two CSA
Proceedings of the 20th annual conference on Integrated circuits and systems design
Dynamic access-control policies on XML encrypted data
ACM Transactions on Information and System Security (TISSEC)
On predictive models and user-drawn graphical passwords
ACM Transactions on Information and System Security (TISSEC)
Privacy and Anonymity Protection with Blind Threshold Signatures
International Journal of Electronic Commerce
An Efficient Blind Signature Scheme for Information Hiding
International Journal of Electronic Commerce
GnatDb: a small-footprint, secure database system
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Applications of fast truncated multiplication in cryptography
EURASIP Journal on Embedded Systems
Pseudorandom recursions: small and fast pseudorandom number generators for embedded applications
EURASIP Journal on Embedded Systems
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Modular inverse algorithms without multiplications for cryptographic applications
EURASIP Journal on Embedded Systems
ID-based cryptography using symmetric primitives
Designs, Codes and Cryptography
Parallel Itoh---Tsujii multiplicative inversion algorithm for a special class of trinomials
Designs, Codes and Cryptography
A novel distributed privacy paradigm for visual sensor networks based on sharing dynamical systems
EURASIP Journal on Applied Signal Processing
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
Computers and Electrical Engineering
Computers and Electrical Engineering
Compact modular exponentiation accelerator for modern FPGA devices
Computers and Electrical Engineering
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
Private and Secure Service Discovery via Progressive and Probabilistic Exposure
IEEE Transactions on Parallel and Distributed Systems
A security architecture for pay-per-view business models in conditional access systems
Proceedings of the 2007 ACM workshop on Digital Rights Management
Randomized radon transforms for biometric authentication via fingerprint hashing
Proceedings of the 2007 ACM workshop on Digital Rights Management
Distance-preserving pseudonymization for timestamps and spatial data
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Pripayd: privacy friendly pay-as-you-drive insurance
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Secure web service federation management using tpm virtualisation
Proceedings of the 2007 ACM workshop on Secure web services
Yet another MicroArchitectural Attack:: exploiting I-Cache
Proceedings of the 2007 ACM workshop on Computer security architecture
An information-theoretic model for adaptive side-channel attacks
Proceedings of the 14th ACM conference on Computer and communications security
A state-of-the-art elliptic curve cryptographic processor operating in the frequency domain
Mobile Networks and Applications
New and improved architectures for Montgomery modular multiplication
Mobile Networks and Applications
Securing Designs against Scan-Based Side-Channel Attacks
IEEE Transactions on Dependable and Secure Computing
A formal semantics for protocol narrations
Theoretical Computer Science
An encrypted payload protocol and target-side scripting engine
WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies
One-way hash function construction based on 2D coupled map lattices
Information Sciences: an International Journal
Cryptanalysis of e-mail protocols providing perfect forward secrecy
Computer Standards & Interfaces
Application and statistic testing of the 5-adic summation-shrinking generator
CompSysTech '07 Proceedings of the 2007 international conference on Computer systems and technologies
The generalized shrinking-multiplexing generator
CompSysTech '07 Proceedings of the 2007 international conference on Computer systems and technologies
The period of the LFSR based generalized shrinking-multiplexing generator
CompSysTech '07 Proceedings of the 2007 international conference on Computer systems and technologies
A Synthesizable Datapath-Oriented Embedded FPGA Fabric for Silicon Debug Applications
ACM Transactions on Reconfigurable Technology and Systems (TRETS) - Special edition on the 15th international symposium on FPGAs
Random-bit sequence generation from image data
Image and Vision Computing
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
Information Sciences: an International Journal
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
Designs, Codes and Cryptography
Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream
EURASIP Journal on Information Security
Digital video encryption algorithms based on correlation-preserving permutations
EURASIP Journal on Information Security
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Hierarchical combination of intruder theories
Information and Computation
Visualization of cryptographic protocols with GRACE
Journal of Visual Languages and Computing
Teaching cryptography with open-source software
Proceedings of the 39th SIGCSE technical symposium on Computer science education
Comparison of innovative signature algorithms for WSNs
WiSec '08 Proceedings of the first ACM conference on Wireless network security
RFID authentication protocol for low-cost tags
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Hierarchical watermarking technique of distortion control mechanism
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Digital design of a cryptographic card (LAM) embedded smart card reader
ICCOMP'07 Proceedings of the 11th WSEAS International Conference on Computers
A blind source separation-based method for multiple images encryption
Image and Vision Computing
Image encryption with compound chaotic sequence cipher shifting dynamically
Image and Vision Computing
Key agreement in ad hoc networks
International Journal of Computational Science and Engineering
Hash chains with diminishing ranges for sensors
International Journal of High Performance Computing and Networking
A study of securing route structures for mobile agents dispatched in parallel
International Journal of Web Engineering and Technology
Memorability of persuasive passwords
CHI '08 Extended Abstracts on Human Factors in Computing Systems
International Journal of Sensor Networks
Efficient multicast stream authentication for the fully adversarial network model
International Journal of Security and Networks
On security proof of McCullagh Barreto's key agreement protocol and its variants
International Journal of Security and Networks
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
International Journal of Security and Networks
Efficient anonymity schemes for clustered wireless sensor networks
International Journal of Sensor Networks
Designing substitution boxes for secure ciphers
International Journal of Innovative Computing and Applications
Accountability in organisations
International Journal of Information and Computer Security
International Journal of Internet Protocol Technology
A secure and efficient authentication scheme for mobile users
International Journal of Mobile Communications
On the correlation of binary sequences
Discrete Applied Mathematics
A secure remote database backup system
AIKED'06 Proceedings of the 5th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases
SafeStore: a durable and practical storage system
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Modelling and Checking Timed Authentication of Security Protocols
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Cryptanalysis on an Elgamal-like cryptosystem for encrypting large messages
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
Silence detection in secure P2P VoIP multiconferencing
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Iris verification based on Iris feature and secret pseudo-random number
ESPOCO'05 Proceedings of the 4th WSEAS International Conference on Electronic, Signal Processing and Control
Improving the novel three-party encrypted key exchange protocol
Computer Standards & Interfaces
Securing group key exchange against strong corruptions
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Robust, anonymous RFID authentication with constant key-lookup
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Secure sensor network routing: a clean-slate approach
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
TinySA: a security architecture for wireless sensor networks
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Versatile multiplier architectures in GF(2k) fields using the Montgomery multiplication algorithm
Integration, the VLSI Journal
Dynamic types for authentication
Journal of Computer Security - Formal Methods in Security Engineering Workshop (FMSE 04)
Accelerated AES implementations via generalized instruction set extensions
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
On replacing cryptographic keys in hierarchical key management systems
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
A new key exchange scheme based on extended Chebyshev polynomials
AMCOS'05 Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science
A pairing SW implementation for Smart-Cards
Journal of Systems and Software
Ubiquity
Practical trust management without reputation in peer-to-peer games
Multiagent and Grid Systems - Grid Computing, high performance and distributed applications
Employ a mobile agent for making a payment
Mobile Information Systems
Off-line economies for digital media
Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video
Ubiquity
A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks
Computer Communications
Scalable and efficient key management for heterogeneous sensor networks
The Journal of Supercomputing
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
Enhanced montgomery multiplication on DSP architectures for embedded public-key cryptosystems
EURASIP Journal on Embedded Systems - Embedded System Design in Intelligent Industrial Automation
Cryptanalysis using genetic algorithms
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Optimizing AES for embedded devices and wireless sensor networks
Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities
The Multics encipher_Algorithm
Cryptologia
Cryptologia
New algorithms and protocols for information authentication in automatic control systems
Automation and Remote Control
Securing user-controlled routing infrastructures
IEEE/ACM Transactions on Networking (TON)
Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS)
Proceedings of the 2008 Spring simulation multiconference
Operating system controlled processor-memory bus encryption
Proceedings of the conference on Design, automation and test in Europe
FPGA design for algebraic tori-based public-key cryptography
Proceedings of the conference on Design, automation and test in Europe
The trace of an optimal normal element and low complexity normal bases
Designs, Codes and Cryptography
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
A unified architecture for a public key cryptographic coprocessor
Journal of Systems Architecture: the EUROMICRO Journal
A key-recovery attack on authentication watermarking by li and yuan
Proceedings of the 10th ACM workshop on Multimedia and security
IDEA cryptographic processor in FPGA
Journal of Computational Methods in Sciences and Engineering - Selected papers from the International Conference on Computer Science,Software Engineering, Information Technology, e-Business, and Applications, 2003
A multisecret sharing scheme for color images based on cellular automata
Information Sciences: an International Journal
A comparative study of ElGamal based digital signature algorithms
Journal of Computational Methods in Sciences and Engineering - Selected papers from the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications, 2004
Partially Blind Threshold Signature Based on RSA
Informatica
New Digital Signature Scheme in Gaussian Monoid
Informatica
One-Way Signature Chaining: a new paradigm for group cryptosystems
International Journal of Information and Computer Security
Database encryption using enhanced affine block cipher algorithm
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
Aspects of airborne continuous surveillance systems: practical image encryption module
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme
Computational Intelligence and Security
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Physical Basis of Quantum Computation and Cryptography
IWINAC '07 Proceedings of the 2nd international work-conference on The Interplay Between Natural and Artificial Computation, Part I: Bio-inspired Modeling of Cognitive Tasks
Targeting Physically Addressable Memory
DIMVA '07 Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Highly Regular Right-to-Left Algorithms for Scalar Multiplication
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
MAME: A Compression Function with Reduced Hardware Requirements
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
AES Encryption Implementation and Analysis on Commodity Graphics Processing Units
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
RF-DNA: Radio-Frequency Certificates of Authenticity
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
PRESENT: An Ultra-Lightweight Block Cipher
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Efficient Hash Collision Search Strategies on Special-Purpose Hardware
Research in Cryptology
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
Research in Cryptology
New Stream Cipher Designs
Linear Slide Attacks on the KeeLoq Block Cipher
Information Security and Cryptology
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
Information Security and Cryptology
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks
Information Security and Cryptology
Unlinkable Randomizable Signature and Its Application in Group Signature
Information Security and Cryptology
A Timing-Resistant Elliptic Curve Backdoor in RSA
Information Security and Cryptology
Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
The Banknote Anti-forgery System Based on Digital Signature Algorithms
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Collisions on SHA-0 in One Hour
Fast Software Encryption
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Fast Software Encryption
Fast Software Encryption
The Analysis of Windows Vista Disk Encryption Algorithm
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Cryptography Adapted to the New European Area of Higher Education
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part II
Looking Back at a New Hash Function
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Preimage Attacks on Step-Reduced MD5
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Building a Collision-Resistant Compression Function from Non-compressing Primitives
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Efficient Finite Fields in the Maxima Computer Algebra System
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Hash Functions and RFID Tags: Mind the Gap
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Bits Security of the Elliptic Curve Diffie---Hellman Secret Keys
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Improved Bounds on Security Reductions for Discrete Log Based Signatures
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Fast Hash-Based Signatures on Constrained Devices
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
A Matrix-Based Secret Sharing Scheme for Images
CIARP '08 Proceedings of the 13th Iberoamerican congress on Pattern Recognition: Progress in Pattern Recognition, Image Analysis and Applications
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
Generators for the l-Torsion Subgroup of Jacobians of Genus Two Curves
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication
ISC '08 Proceedings of the 11th international conference on Information Security
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Fragile Watermarking Schemes for Tamperproof Web Pages
ISNN '08 Proceedings of the 5th international symposium on Neural Networks: Advances in Neural Networks, Part II
Group theoretic properties of Rijndael-like ciphers
Discrete Applied Mathematics
AN INTELLIGENT SECURITY AGENT FOR A RELIABLE CIPHER SYSTEM USING PINGPONG
Cybernetics and Systems
An Empirical Study on the Performance of Java/.Net Cryptographic APIs
Information Systems Security
Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class
Journal of Signal Processing Systems
LIDF: Layered intrusion detection framework for ad-hoc networks
Ad Hoc Networks
Extending web applications with a lightweight zero knowledge proof authentication
CSTST '08 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology
Tahoe: the least-authority filesystem
Proceedings of the 4th ACM international workshop on Storage security and survivability
Improving secure long-term archival of digitally signed documents
Proceedings of the 4th ACM international workshop on Storage security and survivability
Safer parameters for the Chor-Rivest cryptosystem
Computers & Mathematics with Applications
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
International Journal of Applied Cryptography
Securing group key exchange against strong corruptions and key registration attacks
International Journal of Applied Cryptography
Design and implementation of a cipher system (LAM)
WSEAS Transactions on Computers
GSM mobile SMS/MMS using public key infrastructure: m-PKI
WSEAS Transactions on Computers
ACIVS '08 Proceedings of the 10th International Conference on Advanced Concepts for Intelligent Vision Systems
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
A light weight buyer-seller watermarking protocol
Advances in Multimedia
A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
Expert Systems with Applications: An International Journal
A matricial public key cryptosystem with digital signature
WSEAS Transactions on Mathematics
Information Sciences: an International Journal
Montgomery exponent architecture based on programmable cellular automata
Mathematics and Computers in Simulation
Side Channels in the McEliece PKC
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
New stream ciphers based on elliptic curve point multiplication
Computer Communications
An efficient cryptosystem Delta for stream cipher applications
Computers and Electrical Engineering
Proceedings of the 2009 ACM SIGPLAN workshop on Partial evaluation and program manipulation
Anonymous Fair Transaction Protocols Based on Electronic Cash
International Journal of Electronic Commerce
An optimized pseudorandom generator using packed matrices
WSEAS Transactions on Information Science and Applications
Embedded real-time video encryption module on UAV surveillance systems
WSEAS Transactions on Circuits and Systems
A non-interactive deniable authentication scheme based on designated verifier proofs
Information Sciences: an International Journal
Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Pseudo-randomness Inside Web Browsers
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
A Secure Message Percolation Scheme for Wireless Sensor Network
Information Networking. Towards Ubiquitous Networking and Services
Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks
Information Networking. Towards Ubiquitous Networking and Services
Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Type-Based Proxy Re-encryption and Its Construction
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
3D: A Three-Dimensional Block Cipher
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Preimage Attacks on 3, 4, and 5-Pass HAVAL
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
How to Fill Up Merkle-Damgård Hash Functions
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem
Fundamenta Informaticae
Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
A middleware for location-based mobile applications with privacy protection
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Efficient pth root computations in finite fields of characteristic p
Designs, Codes and Cryptography
A variant of Digital Signature Algorithm
Designs, Codes and Cryptography
Dynamic relocation of hybrid tasks: Strategies and methodologies
Microprocessors & Microsystems
A secure and anonymous voter-controlled election scheme
Journal of Network and Computer Applications
Journal of Network and Computer Applications
Usability and performance of secure mobile messaging using public key infrastructure
DNCOCO'08 Proceedings of the 7th conference on Data networks, communications, computers
Design and implementation of a cipher system (LAM) on a FPGA based on PCI architecture
MINO'07 Proceedings of the 6th conference on Microelectronics, nanoelectronics, optoelectronics
Digital design of a key synchronization system on a FPGA for a network use
MINO'07 Proceedings of the 6th conference on Microelectronics, nanoelectronics, optoelectronics
Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm
ISICA '08 Proceedings of the 3rd International Symposium on Advances in Computation and Intelligence
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
An Incentive-Based Secure Charging Scheme for Integrating Networks
Computer Supported Cooperative Work in Design IV
Combined circuit architecture for computing normal basis and montgomery multiplications over GF(2m)
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
Design and analysis of a highly secure stream cipher based on linear feedback shift register
Computers and Electrical Engineering
Security flaw of Hölbl et al.'s protocol
Computer Communications
Secure pairing with biometrics
International Journal of Security and Networks
Usability and performance of secure mobile messaging: M-PKI
WSEAS Transactions on Information Science and Applications
Information-theoretic hashing of 3D objects using spectral graph theory
Expert Systems with Applications: An International Journal
Key management for cipher system (LAM)
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
Accuracy constraint determination in fixed-point system design
EURASIP Journal on Embedded Systems - Reconfigurable Computing and Hardware/Software Codesign
TVA: a DoS-limiting network architecture
IEEE/ACM Transactions on Networking (TON)
Proceedings of the second ACM conference on Wireless network security
Convertible multi-authenticated encryption scheme with one-way hash function
Computer Communications
A middleware service for mobile ad hoc data sharing, enhancing data availability
Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
Multicast Encryption Infrastructure for Security in Sensor Networks
International Journal of Distributed Sensor Networks
Selling multiple secrets to a single buyer
Information Sciences: an International Journal
Formal Modelling of PKI Based Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Montgomery Multiplication with Twice the Bit-Length of Multipliers
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A Multi-Application Smart Card System with Authentic Post-Issuance Program Modification
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Generalized Scalar Multiplication Secure against SPA, DPA, and RPA
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A More Compact Representation of XTR Cryptosystem
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient Implementation of the Pairing on Mobilephones Using BREW
IEICE - Transactions on Information and Systems
RSA-Based Password-Authenticated Key Exchange, Revisited
IEICE - Transactions on Information and Systems
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
IEICE - Transactions on Information and Systems
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Analysis and design of a secure key exchange scheme
Information Sciences: an International Journal
A low-complexity LUT-based squaring algorithm
Computers & Mathematics with Applications
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
Information Systems Frontiers
Designs, Codes and Cryptography
A novel reliable and energy-saving forwarding technique for wireless sensor networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Improving the Boneh-Franklin Traitor Tracing Scheme
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Information Security and Cryptology --- ICISC 2008
A Preimage Attack for 52-Step HAS-160
Information Security and Cryptology --- ICISC 2008
Information Security and Cryptology --- ICISC 2008
Secure and Efficient Group Key Agreements for Cluster Based Networks
Transactions on Computational Science IV
Partnership in key exchange protocols
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Finding Preimages in Full MD5 Faster Than Exhaustive Search
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining
PAKDD '09 Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
Efficient self-certified proxy CAE scheme and its variants
Journal of Systems and Software
Design of a Passport Anti-forgery System Based on Digital Signature Schemes
PAISI '09 Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics
Divisible On-Line/Off-Line Signatures
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Secure multimedia content delivery with multiparty multilevel DRM architecture
Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
Robust live media streaming in swarms
Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
Adaptation-aware encryption of scalable H.264/AVC video for content security
Image Communication
PRNG based on new HCI devices entropy sources: Wii remote study case
Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
Distributed architectures for surrogate clustering in CDNs: a simulation-based analysis
Proceedings of the 4th edition of the UPGRADE-CN workshop on Use of P2P, GRID and agents for the development of content networks
Cryptanalysis of an image encryption scheme based on a compound chaotic sequence
Image and Vision Computing
Authenticated indexing for outsourced spatial databases
The VLDB Journal — The International Journal on Very Large Data Bases
Unified parallel systolic multiplier over GF(2m)
Journal of Computer Science and Technology
Two-factor cancelable biometrics authenticator
Journal of Computer Science and Technology
Distributed data source verification in wireless sensor networks
Information Fusion
True random number generation based on environmental noise measurements for military applications
ISPRA'09 Proceedings of the 8th WSEAS international conference on Signal processing, robotics and automation
Authenticated join processing in outsourced databases
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application
ICCS '09 Proceedings of the 9th International Conference on Computational Science: Part I
Efficient Biometric Verification in Encrypted Domain
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Cryptanalysis of a knapsack-based probabilistic encryption scheme
Information Sciences: an International Journal
Cryptanalysis of four-rounded DES using binary particleswarm optimization
Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers
A Non-abelian Group Based on Block Upper Triangular Matrices with Cryptographic Applications
AAECC-18 '09 Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
ERINDALE: A Polynomial Based Hashing Algorithm
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
Dyna: A Tool for Dynamic Knowledge Modeling
Transactions on Computational Science V
Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Message Authentication Protocol Based on Cellular Automata
Proceedings of the 2007 EvoWorkshops 2007 on EvoCoMnet, EvoFIN, EvoIASP,EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog: Applications of Evolutionary Computing
Testing Stream Ciphers by Finding the Longest Substring of a Given Density
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
A Commitment-Consistent Proof of a Shuffle
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Leak-free mediated group signatures
Journal of Computer Security
A new cryptographic algorithm for the real time applications
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
Design of the host guard firewall for network protection
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
A keyless facility access control system with wireless enabled personal devices
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Where EAP security claims fail
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
A new hardware efficient stream cipher based on hash functions
International Journal of Communication Networks and Distributed Systems
Degenerate keys for RSA encryption
ACM SIGCSE Bulletin
Challenges in teaching a graduate course in applied cryptography
ACM SIGCSE Bulletin
Journal of Systems and Software
Cryptanalysis of two three-party encrypted key exchange protocols
Computer Standards & Interfaces
A secure elliptic curve-based RFID protocol
Journal of Computer Science and Technology
Authorisation infrastructure for on-demand network resource provisioning
GRID '08 Proceedings of the 2008 9th IEEE/ACM International Conference on Grid Computing
On a Construction of Short Digests for Authenticating Ad Hoc Networks
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Efficient and secure protocols for privacy-preserving set operations
ACM Transactions on Information and System Security (TISSEC)
A New Approach to Χ2 Cryptanalysis of Block Ciphers
ISC '09 Proceedings of the 12th International Conference on Information Security
Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
ISC '09 Proceedings of the 12th International Conference on Information Security
Automation and Remote Control
Efficient and secure authenticated key exchange using weak passwords
Journal of the ACM (JACM)
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Pace: Privacy-Protection for Access Control Enforcement in P2P Networks
Globe '09 Proceedings of the 2nd International Conference on Data Management in Grid and Peer-to-Peer Systems
Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
MicroEliece: McEliece for Embedded Devices
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
A New Side-Channel Attack on RSA Prime Generation
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
An on-line electronic check system with mutual authentication
Computers and Electrical Engineering
A novel image hash algorithm resistant to print-scan
Signal Processing
Reasoning about attribute authenticity in a web environment
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 2
Trace and revoke systems with short ciphertexts
Proceedings of the 2nd international conference on Security of information and networks
AIC'09 Proceedings of the 9th WSEAS international conference on Applied informatics and communications
ARM: anonymous routing protocol for mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Hardware Trojan horse detection using gate-level characterization
Proceedings of the 46th Annual Design Automation Conference
User-private information retrieval based on a peer-to-peer community
Data & Knowledge Engineering
Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range
Information Sciences: an International Journal
Secure distributed constraint satisfaction: reaching agreement without revealing private information
Artificial Intelligence - Special issue: Distributed constraint satisfaction
Technical challenges of network anonymity
Computer Communications
On the implementation of security policies with adaptative encryption
Computer Communications
Some common attacks against certified email protocols and the countermeasures
Computer Communications
Cryptanalysis of some improved password-authenticated key exchange schemes
Computer Communications
Remote timing attacks are practical
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Performance analysis of a Denial of Service protection scheme for optimized and QoS-aware handover
Computer Networks: The International Journal of Computer and Telecommunications Networking - Selected papers from the European wireless 2004 conference
Improved server assisted signatures
Computer Networks: The International Journal of Computer and Telecommunications Networking
Specifying Privacy-Preserving Protocols in Typed MSR
Computer Standards & Interfaces
High security Iris verification system based on random secret integration
Computer Vision and Image Understanding
IEEE Transactions on Information Forensics and Security
A novel approach for privacy mining of generic basic association rules
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
A fault-tolerant pipelined architecture for symmetric block ciphers
Computers and Electrical Engineering
Robust multi bit and high quality audio watermarking using pseudo-random sequences
Computers and Electrical Engineering
Adaptive chosen-ciphertext attack on secure arithmetic coding
IEEE Transactions on Signal Processing
Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis
Completeness of discovery protocols
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
A note on leakage-resilient authenticated key exchange
IEEE Transactions on Wireless Communications
Period lengths of chaotic pseudo-random number generators
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Biometric cryptosystem using function based on-line signature recognition
Expert Systems with Applications: An International Journal
Enhancing lifetime and security of PCM-based main memory with start-gap wear leveling
Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture
Properties of the error linear complexity spectrum
IEEE Transactions on Information Theory
On guess and determine cryptanalysis of LFSR-based stream ciphers
IEEE Transactions on Information Theory
Quantum computation and cryptography: an overview
Natural Computing: an international journal
FMIPv6 based secure binding update authentication in wireless vehicular networks
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
Authentication schemes for multimedia streams: Quantitative analysis and comparison
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Cryptanalysis of Boolean permutation-based key escrow scheme
Computers and Electrical Engineering
CEC'09 Proceedings of the Eleventh conference on Congress on Evolutionary Computation
Speech Hashing Algorithm Based on Short-Time Stability
ICANN '09 Proceedings of the 19th International Conference on Artificial Neural Networks: Part II
Strongly Secure Authenticated Key Exchange without NAXOS' Approach
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Teaching Formal Methods Based on Rewriting Logic and Maude
TFM '09 Proceedings of the 2nd International Conference on Teaching Formal Methods
Finding Minimal Addition Chains with a Particle Swarm Optimization Algorithm
MICAI '09 Proceedings of the 8th Mexican International Conference on Artificial Intelligence
Location Based Application Availability
OTM '09 Proceedings of the Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems: ADI, CAMS, EI2N, ISDE, IWSSA, MONET, OnToContent, ODIS, ORM, OTM Academy, SWWS, SEMELS, Beyond SAWSDL, and COMBEK 2009
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
On Cryptographic Schemes Based on Discrete Logarithms and Factoring
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
HPAKE: Password Authentication Secure against Cross-Site User Impersonation
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Short Hash-Based Signatures for Wireless Sensor Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Preimages for Step-Reduced SHA-2
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Security of Cyclic Double Block Length Hash Functions
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Double-Exponentiation in Factor-4 Groups and Its Applications
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Reusing Static Keys in Key Agreement Protocols
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Design of a Secure and Decentralized Location Service for Agent Platforms
Agents and Peer-to-Peer Computing
Broadcast Encryption-Based P2P DRM without Central License Server
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Key Independent Retrieval of Chaotic Encrypted Images
PReMI '09 Proceedings of the 3rd International Conference on Pattern Recognition and Machine Intelligence
Application Management Framework in User Centric Smart Card Ownership Model
Information Security Applications
Unknown Plaintext Template Attacks
Information Security Applications
A CRT based watermark for multiparty multilevel DRM architecture
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Face recognition with biometric encryption for privacy-enhancing self-exclusion
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Image encryption process based on a chaotic true random bit generator
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Transparent and perceptually enhanced JPEG image encryption
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Another look at weak feedback polynomials in the nonlinear combiner
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Design of effective anti-malware system for mobile industrial devices based on windows CE
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
Improved security of neural cryptography using don't-trust-my-partner and error prediction
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
Discrete Applied Mathematics - Special issue: Coding and cryptography
Design and implementation of real-time betting system with offline terminals
Electronic Commerce Research and Applications
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
On Mobile Agents Resistance to Traffic Analysis
Electronic Notes in Theoretical Computer Science (ENTCS)
Information Processing Letters
A secure and scalable Group Key Exchange system
Information Processing Letters
On the uniformity of distribution of the decryption exponent in fixed encryption exponent RSA
Information Processing Letters
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
Information Processing Letters
Ownership-attached unblinding of blind signatures for untraceable electronic cash
Information Sciences: an International Journal
An overview of RFID tags and new cryptographic developments
Information Security Tech. Report
Recent developments in cryptographic hash functions: Security implications and future directions
Information Security Tech. Report
Using probabilistic argumentation for key validation in public-key cryptography
International Journal of Approximate Reasoning
Bit-oriented generators for Wireless Sensor Networks and low cost RFID transponders
ACST '08 Proceedings of the Fourth IASTED International Conference on Advances in Computer Science and Technology
An FPGA based co-processor for elliptic curve cryptography
AsiaCSN '08 Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks
A graph theoretic approach for optimizing key pre-distribution in wireless sensor networks
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
An image encryption using pseudo random bit generator based on a non-linear dynamic chaotic system
WSEAS TRANSACTIONS on COMMUNICATIONS
Power allocation tradeoffs in multicarrier authentication systems
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Enforcing access restrictions on terminal maintenance tasks using smart cards
SoftCOM'09 Proceedings of the 17th international conference on Software, Telecommunications and Computer Networks
Best affine and quadratic approximations of particular classes of Boolean functions
IEEE Transactions on Information Theory
Probabilistic versus deterministic algebraic cryptanalysis: a performance comparison
IEEE Transactions on Information Theory
Joint watermarking scheme for multiparty multilevel DRM architecture
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
A study on the randomness measure of image hashing
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Noninteractive self-certification for long-lived mobile ad hoc networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Distributed secret on the basis of the linear correcting codes
CompSysTech '09 Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
FIE'09 Proceedings of the 39th IEEE international conference on Frontiers in education conference
Security of trusted repeater quantum key distribution networks
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Low-complexity bit-parallel multipliers for a class of GF(2m) based on modified Booth's algorithm
International Journal of Computers and Applications
International Journal of Parallel Programming - Special issue on the 19th international symposium on computer architecture and high performance computing (SBAC-PAD 2007)
Dynamic cryptography algorithm for real-time applications DCA-RTA
ASMCSS'09 Proceedings of the 3rd International Conference on Applied Mathematics, Simulation, Modelling, Circuits, Systems and Signals
A password-authenticated key agreement scheme for ad hoc networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Model-driven development for early aspects
Information and Software Technology
Neural network approach to locating cryptography in object code
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
Compression-unimpaired batch-image encryption combining vector quantization and index compression
Information Sciences: an International Journal
Efficient and privacy-preserving enforcement of attribute-based access control
Proceedings of the 9th Symposium on Identity and Trust on the Internet
Cancellable biometerics featuring with tokenised random number
Pattern Recognition Letters
An energy efficient security protocol for IEEE 802.11 WLANs
Pervasive and Mobile Computing
A new paradigm for collision-free hashing: incrementality at reduced cost
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks on stream ciphers via convolutional codes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An analysis of exponentiation based on formal languages
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
A chosen messages attack on the ISO/IEC 9796-1 signature scheme
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Dial C for cipher: le chiffrement était presque parfait
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Unbridle the bit-length of a crypto-coprocessor with montgomery multiplication
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Multi-pass fast correlation attack on stream ciphers
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Cellular programming and symmetric key cryptography systems
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII
Random number generators with period divisible by a Mersenne prime
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartI
A compact and fast division architecture for a finite field GF(2m)
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartI
A finite state modeling of AFDX frame management using spin
FMICS'06/PDMC'06 Proceedings of the 11th international workshop, FMICS 2006 and 5th international workshop, PDMC conference on Formal methods: Applications and technology
Designated verification of digital watermark for network based image distribution
ICCS'03 Proceedings of the 2003 international conference on Computational science
Secure data aggregation with multiple encryption
EWSN'07 Proceedings of the 4th European conference on Wireless sensor networks
A pseudorandom bit generator based on block upper triangular matrices
ICWE'03 Proceedings of the 2003 international conference on Web engineering
A secure mobile agent system using multi-signature scheme in electronic commerce
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
Secure communication for RFIDs proactive information security within computational security
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
Energy-efficient and non-interactive self-certification in MANETs
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
Decoding of interleaved Reed Solomon codes over noisy data
ICALP'03 Proceedings of the 30th international conference on Automata, languages and programming
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Interpolation of the elliptic curve Diffie-Hellman mapping
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
An anonymous credential system and a privacy-aware PKI
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
A taxonomy of single sign-on systems
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Permanent fault attack on the parameters of RSA with CRT
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
An efficient revocation scheme with minimal message length for stateless receivers
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Robust software tokens: yet another method for securing user's digital identity
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal orders
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Square hash with a small key size
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
A direct anonymous attestation scheme for embedded devices
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Applying SDL to formal analysis of security systems
SDL'03 Proceedings of the 11th international conference on System design
TCC'07 Proceedings of the 4th conference on Theory of cryptography
A process-oriented model for authentication on the basis of a coloured Petri net
BPM'03 Proceedings of the 2003 international conference on Business process management
VECPAR'06 Proceedings of the 7th international conference on High performance computing for computational science
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Secure remote user authentication scheme using bilinear pairings
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
CRT RSA algorithm protected against fault attacks
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Efficient user authentication and key agreement in wireless sensor networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Efficient implementation of pseudorandom functions for electronic seal protection protocols
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
EAP using the split password-based authenticated key agreement
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
An implementation of a universally verifiable electronic voting scheme based on shuffling
FC'02 Proceedings of the 6th international conference on Financial cryptography
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Hardware fault attack on RSA with CRT revisited
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Speeding up secure sessions establishment on the internet
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Hiding names: private authentication in the applied pi calculus
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Concealment and its applications to authenticated encryption
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Predicting the shrinking generator with fixed connections
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A practical inter-sensor broadcast authentication scheme
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
Biometric digital key mechanisms for telebiometric authentication based on biometric certificate
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
On a class of key agreement protocols which cannot be unconditionally secure
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
On a resynchronization weakness in a class of combiners with memory
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
A WTLS handshake protocol with user anonymity and forward secrecy
CIC'02 Proceedings of the 7th CDMA international conference on Mobile communications
An analysis of proxy signatures: is a secure channel necessary?
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Construct public key encryption scheme using ergodic matrices over GF(2)
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
An analysis of the Hermes8 stream ciphers
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
On building hash functions from multivariate quadratic equations
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Double-size bipartite modular multiplication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Combining prediction hashing and MDS codes for efficient multicast stream authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Verification across intellectual property boundaries
CAV'07 Proceedings of the 19th international conference on Computer aided verification
CAIP'07 Proceedings of the 12th international conference on Computer analysis of images and patterns
IEEE Transactions on Information Forensics and Security
Fragility analysis of adaptive quantization-based image hashing
IEEE Transactions on Information Forensics and Security
An abuse-free fair contract-signing protocol based on the RSA signature
IEEE Transactions on Information Forensics and Security
Privacy-aware multi-context RFID infrastructure using public key cryptography
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Performance of large low-associativity caches
ACM SIGMETRICS Performance Evaluation Review
Is your security protocol on time?
FSEN'07 Proceedings of the 2007 international conference on Fundamentals of software engineering
RFID privacy using spatially distributed shared secrets
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
Biometric digital signature key generation and cryptography communication based on fingerprint
FAW'07 Proceedings of the 1st annual international conference on Frontiers in algorithmics
SKEMON: a simple certificate-less method for key exchange by using mobile network
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Amplifying collision resistance: a complexity-theoretic treatment
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Solving discrete logarithms from partial knowledge of the key
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Computationally-efficient password authenticated key exchange based on quadratic residues
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
LFSR based stream ciphers are vulnerable to power attacks
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
On security models and compilers for group key exchange protocols
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
An improved SCARE cryptanalysis against a secret A3/A8 GSM algorithm
ICISS'07 Proceedings of the 3rd international conference on Information systems security
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Improving efficiency and simplicity of Tor circuit establishment and hidden services
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
An hybrid approach for efficient multicast stream authentication over unsecured channels
ProvSec'07 Proceedings of the 1st international conference on Provable security
A CDH-based strongly unforgeable signature without collision resistant hash function
ProvSec'07 Proceedings of the 1st international conference on Provable security
EC-Web'07 Proceedings of the 8th international conference on E-commerce and web technologies
Token-based authenticated key establishment protocols for three-party communication
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A simple variant of the Merkle-Damgård scheme with a permutation
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Miniature CCA2 PK encryption: tight security without redundancy
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Browser based agile e-voting system
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Efficient computation of the best quadratic approximations of cubic boolean functions
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Cryptanalysis of the EPBC authenticated encryption mode
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
New branch prediction vulnerabilities in openSSL and necessary software countermeasures
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Remarks on the new attack on the filter generator and the role of high order complexity
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Efficient 15,360-bit RSA using woop-optimised montgomery arithmetic
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Toward acceleration of RSA using 3D graphics hardware
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
The Martini Synch: joint fuzzy hashing via error correction
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Enabling full-size public-key algorithms on 8-bit sensor nodes
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Distance bounding in noisy environments
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Reduced complexity attacks on the alternating step generator
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Linear cryptanalysis of non binary ciphers
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Revisiting correlation-immunity in filter generators
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
On authentication with HMAC and non-random properties
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Randomness and representation of span n sequences
SSC'07 Proceedings of the 2007 international conference on Sequences, subsequences, and consequences
ARCS'08 Proceedings of the 21st international conference on Architecture of computing systems
A new key agreement protocol based on chaotic maps
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
The twin Diffie-Hellman problem and applications
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
On the indifferentiability of the sponge construction
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Second preimage attacks on dithered hash functions
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Towards tamper resistant code encryption: practice and experience
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
DAKOTA: hashing from a combination of modular arithmetic and symmetric cryptography
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
The security of EPC Gen2 compliant RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Security analysis of the authentication modules of Chinese WLAN standard and its implementation plan
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
On the BRIP algorithms security for RSA
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Application of data mining in cryptanalysis
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Analysis of ECDSA authentication processing in VANETs
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Robust uncorrelated bit extraction methodologies for wireless sensors
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Evolutionary design of resilient substitution boxes: from coding to hardware implementation
ICES'07 Proceedings of the 7th international conference on Evolvable systems: from biology to hardware
A secret sharing scheme for digital images based on two-dimensional linear cellular automata
IWCIA'08 Proceedings of the 12th international conference on Combinatorial image analysis
Multipolarity for the object naming service
IOT'08 Proceedings of the 1st international conference on The internet of things
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Security protocols: principles and calculi tutorial notes
Foundations of security analysis and design IV
Secure function evaluation based on secret sharing and homomorphic encryption
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Real time hardware crypto cards based on DSP
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Proceedings of the 13th international conference on Security protocols
Modified AES using chaotic key generator for satellite imagery encryption
ICIC'09 Proceedings of the 5th international conference on Emerging intelligent computing technology and applications
A fragile watermarking scheme protecting originator's rights for multimedia service
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Improving the single-assumption authenticated Diffie-Hellman key agreement protocols
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Content-based image watermarking via public-key cryptosystems
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Using adaptative encryption for ubiquitous environments
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Secure Bluetooth services in an m-learning environment
SEPADS'10 Proceedings of the 9th WSEAS international conference on Software engineering, parallel and distributed systems
An algorithm to fill out a bloc with pseudorandom binary data
CEA'10 Proceedings of the 4th WSEAS international conference on Computer engineering and applications
A verifiable multi-secret sharing scheme based on cellular automata
Information Sciences: an International Journal
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
Collisions for variants of the BLAKE hash function
Information Processing Letters
Parallel computation of modular exponentiation for fast cryptography
International Journal of High Performance Systems Architecture
Efficient hardware for modular exponentiation using the sliding-window method
International Journal of High Performance Systems Architecture
A novel pseudonoise sequence for time-spread echo based audio watermarking
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A meta-level true random number generator
International Journal of Critical Computer-Based Systems
ICONIP'08 Proceedings of the 15th international conference on Advances in neuro-information processing - Volume Part I
Public key encryption and encryption emulation attacks
CSR'08 Proceedings of the 3rd international conference on Computer science: theory and applications
Cryptanalysis of Stickel's key exchange scheme
CSR'08 Proceedings of the 3rd international conference on Computer science: theory and applications
Provably secure randomized blind signature scheme based on bilinear pairing
Computers & Mathematics with Applications
Chaos-based secure satellite imagery cryptosystem
Computers & Mathematics with Applications
Advanced smart card based password authentication protocol
Computer Standards & Interfaces
Message origin authentication and integrity protection in chaos-based optical communication
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Anonymous and authenticated routing in multi-hop cellular networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Speeding up homomorpic hashing using GPUs
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A novel public key self-embedding fragile watermarking technique for image authentication
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
PSKA: usable and secure key agreement scheme for body area networks
IEEE Transactions on Information Technology in Biomedicine
Universal authentication protocols for anonymous wireless communications
IEEE Transactions on Wireless Communications
Parameterized splitting systems for the discrete logarithm
IEEE Transactions on Information Theory
Blind authentication: a secure crypto-biometric verification protocol
IEEE Transactions on Information Forensics and Security
A survey of confidential data storage and deletion methods
ACM Computing Surveys (CSUR)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Tampering in RFID: A Survey on Risks and Defenses
Mobile Networks and Applications
A combined DCA: GA for constructing highly nonlinear balanced boolean functions in cryptography
Journal of Global Optimization
Combinatorial Designs for Authentication and Secrecy Codes
Foundations and Trends in Communications and Information Theory
Lightweight mutual authentication and ownership transfer for RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
P-coding: secure network coding against eavesdropping attacks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Anonymous group implicit certificate scheme
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
A multi-scale triangular mapping and its applications in variation scale scrambling
International Journal of Computer Applications in Technology
A trustworthy identity management architecture for e-government processes in Pakistan
Proceedings of the 7th International Conference on Frontiers of Information Technology
Modified self-shrinking generator
Computers and Electrical Engineering
Security enhancements against UMTS-GSM interworking attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A secure and efficient SIP authentication scheme for converged VoIP networks
Computer Communications
A privacy-preserving protocol for finding the nearest doctor in an emergency
Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments
An approach for node identification and key management in sensor grids
Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies
Strategies for health data exchange for secondary, cross-institutional clinical research
Computer Methods and Programs in Biomedicine
Image encryption using discrete parametric cosine transform
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Image encryption algorithms based on generalized P-gray code bit plane decomposition
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Introduction to the wire-speed processor and architecture
IBM Journal of Research and Development
Visualizing your key for secure phone calls and language independence
Proceedings of the Seventh International Symposium on Visualization for Cyber Security
Proceedings of the ACM SIGCOMM 2010 conference
The cost of false alarms in Hellman and rainbow tradeoffs
Designs, Codes and Cryptography
Designs, Codes and Cryptography
Certificateless authenticated group key agreement protocol for unbalanced wireless mobile networks
WSEAS TRANSACTIONS on COMMUNICATIONS
JEA K-128: a novel encryption algorithm using VHDL
WSEAS Transactions on Computers
A data security protocol for the Trusted Truck® system
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
An efficient implementation of montgomery powering ladder in reconfigurable hardware
SBCCI '10 Proceedings of the 23rd symposium on Integrated circuits and system design
A randomized countermeasure against parasitic adversaries in wireless sensor networks
IEEE Journal on Selected Areas in Communications - Special issue on simple wireless sensor networking solutions
Delay and disruption tolerant web services for heterogeneous networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Techniques for policy enforcement on encrypted network traffic
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
For members only: local and robust group management in DTNS
Proceedings of the 5th ACM workshop on Challenged networks
Toward secure and private service discovery anywhere anytime
Frontiers of Computer Science in China
Journal of Intelligent Manufacturing
Robust Deniable Authentication Protocol
Wireless Personal Communications: An International Journal
IEEE Transactions on Information Theory
Synthesis-for-testability watermarking for field authenticatioil of VLSI intellectual property
IEEE Transactions on Circuits and Systems Part I: Regular Papers
Combinatorial multicollision attacks on generalized iterated hash functions
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure three-party key distribution protocol for fast network access in EAP-based wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
FPGA implementation for real time encryption engine for real time video
ICC'10 Proceedings of the 14th WSEAS international conference on Circuits
Formalism in coding the genetic information
ICAI'10 Proceedings of the 11th WSEAS international conference on Automation & information
Efficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curves
Information Processing Letters
RC5-based security in wireless sensor networks: utilization and performance
WSEAS Transactions on Computers
A control point for reducing root abuse of file-system privileges
Proceedings of the 17th ACM conference on Computer and communications security
Discrete Applied Mathematics
Hardware intrinsic security from D flip-flops
Proceedings of the fifth ACM workshop on Scalable trusted computing
Fault-based attack of RSA authentication
Proceedings of the Conference on Design, Automation and Test in Europe
Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks
Electronic Commerce Research
Proceedings of the international conference on Multimedia
Hardware evaluation of the stream cipher-based hash functions RadioGatún and irRUPT
Proceedings of the Conference on Design, Automation and Test in Europe
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Nonlinear equivalence of stream ciphers
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Finding preimages of tiger up to 23 steps
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Enhanced security notions for dedicated-key hash functions: definitions and relationships
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
Pairing-Based Onion Routing with Improved Forward Secrecy
ACM Transactions on Information and System Security (TISSEC)
Making a nymbler nymble using VERBS
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
New results on instruction cache attacks
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
New high entropy element for FPGA based true random number generators
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Pseudorandom sequences and stream ciphers
Algorithms and theory of computation handbook
Lightweight cryptography and RFID: tackling the hidden overheads
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
A timing attack against patterson algorithm in the McEliece PKC
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Preimage attacks on reduced steps of ARIRANG and PKC98-hash
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Improved preimage attack for 68-step HAS-160
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Cryptography for network security: failures, successes and challenges
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
A new security model for authenticated key agreement
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Zero-knowledge argument for simultaneous discrete logarithms
COCOON'10 Proceedings of the 16th annual international conference on Computing and combinatorics
Degrees of security: protocol guarantees in the face of compromising adversaries
CSL'10/EACSL'10 Proceedings of the 24th international conference/19th annual conference on Computer science logic
Modeling and analyzing security in the presence of compromising adversaries
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Journal of Network and Computer Applications
A general power model of differential power analysis attacks to static logic circuits
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Secure electronic bills of lading: blind counts and digital signatures
Electronic Commerce Research
On the nonlinearity of exponential welch costas functions
IEEE Transactions on Information Theory
Encoding Basic Arithmetic Operations for SAT-Solvers
Proceedings of the 2010 conference on Artificial Intelligence Research and Development: Proceedings of the 13th International Conference of the Catalan Association for Artificial Intelligence
Weakness analysis of a key stream generator based on cellular automata
PPAM'09 Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part II
Pseudorandom vector sequences derived from triangular polynomial systems with constant multipliers
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
Speeding up bipartite modular multiplication
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
Okamoto-Tanaka revisited: fully authenticated diffie-hellman with minimal overhead
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
A new human identification protocol and coppersmith's baby-step giant-step algorithm
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
A novel stream cipher for cryptographic applications
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Public key cryptographic system using mandelbrot sets
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Practical security for disconnected nodes
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Keeping data secret under full compromise using porter devices
Proceedings of the 26th Annual Computer Security Applications Conference
Exploiting the physical layer for enhanced security
IEEE Wireless Communications
Securing cluster-based ad hoc networks with distributed authorities
IEEE Transactions on Wireless Communications
Lightweight mutual authentication protocol for securing RFID applications
International Journal of Internet Technology and Secured Transactions
A survey on RFID security and provably secure grouping-proof protocols
International Journal of Internet Technology and Secured Transactions
Secure unicast and multicast over satellite DVB using chaotic generators
International Journal of Internet Technology and Secured Transactions
Communications of the ACM
Efficient implementation of pairing on BREW mobile phones
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Match it or die: proving integrity by equality
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
Key management for large-scale distributed storage systems
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
A calculus for game-based security proofs
ProvSec'10 Proceedings of the 4th international conference on Provable security
Collision resistant double-length hashing
ProvSec'10 Proceedings of the 4th international conference on Provable security
ZKPDL: a language-based system for efficient zero-knowledge proofs and electronic cash
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Scan-based attacks on linear feedback shift register based stream ciphers
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Design and implementation of a public key-based group collaboration system
Computer Communications
On message recognition protocols: recoverability and explicit confirmation
International Journal of Applied Cryptography
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
IEEE Transactions on Neural Networks
A persistent public watermarking of relational databases
ICISS'10 Proceedings of the 6th international conference on Information systems security
Secure key management scheme for dynamic hierarchical access control based on ECC
Journal of Systems and Software
Cryptanalysis of a quadratic knapsack cryptosystem
Computers & Mathematics with Applications
A new untraceable off-line electronic cash system
Electronic Commerce Research and Applications
A secure broadcasting cryptosystem and its application to grid computing
Future Generation Computer Systems
A high-performance unified-field reconfigurable cryptographic processor
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique
Proceedings of the 2011 International Conference on Communication, Computing & Security
A novel simple secure internet voting protocol
Proceedings of the 2011 International Conference on Communication, Computing & Security
Comments on matrix-based secret sharing scheme for images
CIARP'10 Proceedings of the 15th Iberoamerican congress conference on Progress in pattern recognition, image analysis, computer vision, and applications
Horizontal correlation analysis on exponentiation
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Security enhancement and modular treatment towards authenticated key exchange
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Image distortion estimation by hash comparison
MMM'11 Proceedings of the 17th international conference on Advances in multimedia modeling - Volume Part I
Cryptanalysis of the ESSENCE family of hash functions
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Gemstone: a new stream cipher using coupled map lattice
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Hardware framework for the rabbit stream cipher
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
A decentralized approach to secure management of nodes in distributed sensor networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
Secure routing in ad hoc networks and a related intrusion detection problem
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Shared RSA key generation in a mobile ad hoc network
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
VPSS: a verifiable proactive secret sharing scheme in distributed systems
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Implementation and testing of high-speed CMOS true random number generators based on chaotic systems
IEEE Transactions on Circuits and Systems Part I: Regular Papers - Special section on 2009 IEEE system-on-chip conference
Lightweight RFID authentication with forward and backward security
ACM Transactions on Information and System Security (TISSEC)
Improving the security of cardspace
EURASIP Journal on Information Security
Self-generated-certificate public key encryption without pairing and its application
Information Sciences: an International Journal
A mission-critical certification authority architecture for high reliability and response time
International Journal of Critical Computer-Based Systems
FAST'11 Proceedings of the 9th USENIX conference on File and stroage technologies
Secret-sharing hardware improves the privacy of network monitoring
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
The differential analysis of S-functions
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Optimal covering codes for finding near-collisions
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
One-pass HMQV and asymmetric key-wrapping
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
PEA: Polymorphic Encryption Algorithm based on quantum computation
International Journal of Systems, Control and Communications
A novel and efficient cryptosystem for large message encryption
International Journal of Information and Communication Technology
Threshold signature schemes for ElGamal variants
Computer Standards & Interfaces
Critique of the related-key attack concept
Designs, Codes and Cryptography
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
Journal of Computer Security
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
Journal of Computer Security
A framework for analyzing RFID distance bounding protocols
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
FPGA implementation of binary edwards curve usingternary representation
Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI
The future of high-speed cryptography: new computing platforms and new ciphers
Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI
Quality of service regulation in secure body area networks: system modeling and adaptation methods
EURASIP Journal on Wireless Communications and Networking - Special issue on towards the connected body: advances in body communications
Enabling the archival storage of signed documents
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
Venti: a new approach to archival storage
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
Plutus: scalable secure file sharing on untrusted storage
FAST'03 Proceedings of the 2nd USENIX conference on File and storage technologies
Integrating portable and distributed storage
FAST'04 Proceedings of the 3rd USENIX conference on File and storage technologies
Computer algorithms for direct encryption and decryption of digital images for secure communication
ACS'06 Proceedings of the 6th WSEAS international conference on Applied computer science
Partial selection scheme of MPEG-1 stream for the purpose of encryption using open SSL libraries
MIV'05 Proceedings of the 5th WSEAS international conference on Multimedia, internet & video technologies
Chaotic cryptosystem based on inverse duffing circuit
NOLASC'06 Proceedings of the 5th WSEAS international conference on Non-linear analysis, non-linear systems and chaos
Construction of a convolutional code based symmetric cryptosystem
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Fast pseudorandom generator based on packed matrices
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Security and performance trade-off in KILAVI wireless sensor network
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
A cryptographic scheme based on neural networks
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
Key management systems for sensor networks in the context of the Internet of Things
Computers and Electrical Engineering
Integrity protecting hierarchical concealed data aggregation for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Lossless compression of biometric image data
SIP'06 Proceedings of the 5th WSEAS international conference on Signal processing
A new public key cryptography algorithm using chaotic systems and hyperelliptic curves
ICS'06 Proceedings of the 10th WSEAS international conference on Systems
Confidentiality with mobile sessions for web servers based on objects serialization
ICS'06 Proceedings of the 10th WSEAS international conference on Systems
Random Gray code and its performance analysis for image hashing
Signal Processing
A user friendly authentication scheme with anonymity for wireless communications
Computers and Electrical Engineering
Transactions on computational science X
GPU accelerated cryptography as an OS service
Transactions on computational science XI
J-PAKE: authenticated key exchange without PKI
Transactions on computational science XI
A formal semantics for protocol narrations
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Blind source separation-based encryption of images and speeches
ISNN'05 Proceedings of the Second international conference on Advances in neural networks - Volume Part II
An efficient anonymous authentication protocol for mobile pay-TV
Journal of Network and Computer Applications
Security weaknesses of authenticated key agreement protocols
Information Processing Letters
Secure SMS communications for M-learning services
ECC'11 Proceedings of the 5th European conference on European computing conference
SoC: a real platform for IP reuse, IP infringement, and IP protection
VLSI Design - Special issue on CAD for Gigascale SoC Design and Verification Solutions
Cryptanalysis of a type of CRT-based RSA algorithms
Journal of Computer Science and Technology
Extended KCI attack against two-party key establishment protocols
Information Processing Letters
Robust image hash in Radon transform domain for authentication
Image Communication
A fair online payment system for digital content via subliminal channel
Electronic Commerce Research and Applications
Cryptanalytic attack on the self-shrinking sequence generator
ICANNGA'11 Proceedings of the 10th international conference on Adaptive and natural computing algorithms - Volume Part II
A mutual and pseudo inverse matrix - based authentication mechanism for outsourcing service
ACIIDS'11 Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I
Combined circuit architecture for computing normal basis and Montgomery multiplications over GF(2m)
International Journal of Autonomous and Adaptive Communications Systems
Highly-efficient universally-composable commitments based on the DDH assumption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
New impossible differential and known-key distinguishers for the 3D cipher
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
A new security proof of practical cryptographic devices based on hardware, software and protocols
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Analysis and improvement of an authenticated key exchange protocol
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Confidential deniable authentication using promised signcryption
Journal of Systems and Software
A web services based architecture for digital time stamping
Journal of Web Engineering
Universal quantum computation in a hidden basis
Quantum Information & Computation
New encoding schemes for quantum authentication
Quantum Information & Computation
A comparison of post-processing techniques for biased random number generators
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Parallelization of the Lanczos algorithm on multi-core platforms
ICDCN'10 Proceedings of the 11th international conference on Distributed computing and networking
Cryptanalysis of the knapsack generator
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Meet-in-the-middle preimage attacks on AES hashing modes and an application to whirlpool
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Security'08 Proceedings of the 16th International conference on Security protocols
Structural properties of cryptographic sequences
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
A multisignature scheme based on the SDLP and on the IFP
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Cryptanalysis of multicast protocols with key refreshment based on the extended euclidean algorithm
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
An approach for adapting moodle into a secure infrastructure
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
A reversible data hiding scheme for VQ indices using locally adaptive coding
Journal of Visual Communication and Image Representation
Practical attacks on the maelstrom-0 compression function
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Analysis of message injection in stream cipher-based hash functions
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Collisions of MMO-MD5 and their impact on original MD5
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Memory-constrained implementations of elliptic curve cryptography in co-Z coordinate representation
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Efficient multiplication in finite field extensions of degree 5
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
SOBA: secrecy-preserving observable ballot-level audit
EVT/WOTE'11 Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections
Application-binding protocol in the user centric smart card ownership model
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Variants of multicollision attacks on iterated hash functions
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
KALwEN+: practical key management schemes for gossip-based wireless medical sensor networks
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
McEliece and niederreiter cryptosystems that resist quantum fourier sampling attacks
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Visualizing secure Hash algorithm (SHA-1) on the web
AMT'11 Proceedings of the 7th international conference on Active media technology
Attaching multiple personal identifiers in X.509 digital certificates
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Building multimedia security applications in the MPEG reconfigurable video coding (RVC) framework
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Efficient defence against misbehaving TCP receiver DoS attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A recurrent method for constructing irreducible polynomials over finite fields
CASC'11 Proceedings of the 13th international conference on Computer algebra in scientific computing
Preimage attacks against PKC98-Hash and HAS-V
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Fault attacks on the montgomery powering ladder
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Parallel logical cryptanalysis of the generator A5/1 in BNB-grid system
PaCT'11 Proceedings of the 11th international conference on Parallel computing technologies
A light-weight solution to preservation of access pattern privacy in un-trusted clouds
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
libhashckpt: hash-based incremental checkpointing using GPU's
EuroMPI'11 Proceedings of the 18th European MPI Users' Group conference on Recent advances in the message passing interface
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
Efficient hashing using the AES instruction set
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
A secure perceptual hash algorithm for image content authentication
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Evolutionary construction of de bruijn sequences
Proceedings of the 4th ACM workshop on Security and artificial intelligence
Proceedings of the 18th ACM conference on Computer and communications security
Practical PIR for electronic commerce
Proceedings of the 18th ACM conference on Computer and communications security
Countering GATTACA: efficient and secure testing of fully-sequenced human genomes
Proceedings of the 18th ACM conference on Computer and communications security
Elliptic curve for data protection
Proceedings of the 2011 Information Security Curriculum Development Conference
Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes
Wireless Personal Communications: An International Journal
Toward pairing-free certificateless authenticated key exchanges
ISC'11 Proceedings of the 14th international conference on Information security
Generalized avalanche test for stream cipher analysis
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Cryptanalysis of simplified-DES using computational intelligence
WSEAS Transactions on Computers
Encrypted Packet Forwarding in Virtualized Networks
Proceedings of the 2011 ACM/IEEE Seventh Symposium on Architectures for Networking and Communications Systems
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
MM '11 Proceedings of the 19th ACM international conference on Multimedia
Keyed hash function based on a chaotic map
Information Sciences: an International Journal
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
An improved two-party identity-based authenticated key agreement protocol using pairings
Journal of Computer and System Sciences
A new proxy signcryption scheme using warrants
International Journal of Intelligent Engineering Informatics
Pseudorandomness and Dynamics of Fermat Quotients
SIAM Journal on Discrete Mathematics
Breaking undercover: exploiting design flaws and nonuniform human behavior
Proceedings of the Seventh Symposium on Usable Privacy and Security
New multi-server password authentication scheme using neural networks
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part II
New guess-and-determine attack on the self-shrinking generator
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Combining compression functions and block cipher-based hash functions
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
A new simple technique to attack filter generators and related ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Modular number systems: beyond the mersenne family
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
A subliminal channel in secret block ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Predicting subset sum pseudorandom generators
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Password based key exchange with mutual authentication
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Proceedings of the 11th international conference on Security Protocols
Compiler mitigations for time attacks on modern x86 processors
ACM Transactions on Architecture and Code Optimization (TACO) - HIPEAC Papers
Decrypting classical cipher text using Markov chain Monte Carlo
Statistics and Computing
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
On the importance of public-key validation in the MQV and HMQV key agreement protocols
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
General conversion for obtaining strongly existentially unforgeable signatures
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
CMSS: an improved merkle signature scheme
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
A lookup table model for time-memory trade-off attacks on binary additive stream ciphers
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
A non-committing encryption scheme based on quadratic residue
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Deterministic analysis of balancedness in symmetric cryptography
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Improved pairing protocol for bluetooth
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Improving the ID-Based key exchange protocol in wireless mobile ad hoc networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Aggregation queries in the database-as-a-service model
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
An optimizing authenticated key exchange protocol for self-organizing sensor networks
UCS'06 Proceedings of the Third international conference on Ubiquitous Computing Systems
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
Efficient software implementations of large finite fields GF(2n) for secure storage applications
ACM Transactions on Storage (TOS)
Puzzle: a novel video encryption algorithm
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Non-interactive watermark detection for a correlation-based watermarking scheme
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Trustworthy verification and visualisation of multiple XML-signatures
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Authenticated key agreement without subgroup element verification
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Authentication of outsourced databases using signature aggregation and chaining
DASFAA'06 Proceedings of the 11th international conference on Database Systems for Advanced Applications
Towards a secure and practical multifunctional smart card
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Optimal use of montgomery multiplication on smart cards
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Off-Line group signatures with smart cards
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Efficient batch verification for RSA-Type digital signatures in a ubiquitous environment
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
Cryptanalysis and improvement of a multisignature scheme
IWDC'05 Proceedings of the 7th international conference on Distributed Computing
A deterministic approach to balancedness and run quantification in pseudorandom pattern generators
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
Evaluation of audio streaming in secure wireless access network
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
Security of an efficient ID-Based authenticated key agreement protocol from pairings
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
SSS'05 Proceedings of the 7th international conference on Self-Stabilizing Systems
Do all elliptic curves of the same order have the same difficulty of discrete log?
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Interpolation of functions related to the integer factoring problem
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Secure mutual distrust transaction tracking using cryptographic elements
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
A family of fast syndrome based cryptographic hash functions
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Optimization of the MOVA undeniable signature scheme
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Finding optimal addition chains using a genetic algorithm approach
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
User-oriented multimedia service using smart sensor agent module in the intelligent home
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
On the security of the canetti-krawczyk model
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Authenticated queries in sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Iris authentication using privatized advanced correlation filter
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
A novel hybrid crypto-biometric authentication scheme for ATM based banking applications
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
New key management systems for multilevel security
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
SPA-resistant simultaneous scalar multiplication
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Efficient dos resistant multicast authentication schemes
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A new MAC construction alred and a specific instance ALPHA-MAC
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
F-FCSR: design of a new class of stream ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Preimage and collision attacks on MD2
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Crympix: cryptographic multiprecision library
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Efficient key updates in encrypted database systems
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Securing the MPLS control plane
HPCC'05 Proceedings of the First international conference on High Performance Computing and Communications
HIGHT: a new block cipher suitable for low-resource device
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Implementing cryptographic pairings on smartcards
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Fast generation of prime numbers on portable devices: an update
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Why one should also secure RSA public key elements
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Secure group communication with low communication complexity
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
A tree based one-key broadcast encryption scheme with low computational overhead
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Using “fair forfeit” to prevent truncation attacks on mobile agents
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
An efficient group signature scheme from bilinear maps
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Cryptanalysis of two variants of PCBC mode when used for message integrity
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
A fast decryption algorithm for BSS-Based image encryption
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
On the generation of fast verifiable IPv6 addresses
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part IV
An improved lu-cao's remote user authentication scheme using smart card
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Enhanced forward-secure user authentication scheme with smart cards
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Pseudonymous PKI for ubiquitous computing
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Parallel modular exponentiation using load balancing without precomputation
Journal of Computer and System Sciences
An efficient password authentication schemes without using the server public key for grid computing
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
TMD-Tradeoff and state entropy loss considerations of streamcipher MICKEY
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
New authentication scheme based on a one-way hash function and diffie-hellman key exchange
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Non-expanding transaction specific pseudonymization for IP traffic monitoring
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Efficient simultaneous inversion in parallel and application to point multiplication in ECC
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Improvement of an efficient user identification scheme based on ID-Based cryptosystem
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A new simple authenticated key agreement and protected password change protocol
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Secure fingerprint-based remote user authentication scheme using smartcards
WINE'05 Proceedings of the First international conference on Internet and Network Economics
SOFSEM'06 Proceedings of the 32nd conference on Current Trends in Theory and Practice of Computer Science
RFID-Tags for anti-counterfeiting
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Various types of attacks and solutions regarding secure remote user access over insecure networks
ICCSA'06 Proceedings of the 6th international conference on Computational Science and Its Applications - Volume Part I
Energy conserving security mechanism for wireless sensor network
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Efficient unilateral authentication mechanism for MIPv6
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part I
Some plausible constructions of double-block-length hash functions
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
The ideal-cipher model, revisited: an uninstantiable blockcipher-based hash function
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Fast bounds on the distribution of smooth numbers
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Efficient mutual authentication scheme with smart card
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
Memoryless near-collisions via coding theory
Designs, Codes and Cryptography
The square root Diffie---Hellman problem
Designs, Codes and Cryptography
Cryptography and Communications
A novel image cipher based on mixed transformed logistic maps
Multimedia Tools and Applications
A new mobile payment system with formal verification
International Journal of Internet Technology and Secured Transactions
Development of a neural net-based, personalized secure communication link
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part I
Is it wise to publish your public RSA keys?
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Cryptanalysis of two protocols for RSA with CRT based on fault infection
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Incorporating error detection in an RSA architecture
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
An easily testable and reconfigurable pipeline for symmetric block ciphers
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Cryptographic key reliable lifetimes: bounding the risk of key exposure in the presence of faults
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Fault analysis of DPA-Resistant algorithms
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Selective video encryption based on advanced video coding
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
Robust secret key based authentication scheme using smart cards
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
Identity-based key agreement with unilateral identity privacy using pairings
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
An improved popescu's authenticated key agreement protocol
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Lightweight wireless intrusion detection systems against DDoS attack
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
One-time password authentication scheme using smart cards providing user anonymity
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
A new ciphering method associated with evolutionary algorithm
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Multi-modal techniques for identity theft prevention
HSI'05 Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
On the optimization of side-channel attacks by advanced stochastic methods
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
A secure mobile agent protocol for AMR systems in home network environments
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Strengthening password-based authentication protocols against online dictionary attacks
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
A traitor tracing scheme based on RSA for fast decryption
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Indexing information for data forensics
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Intrusion-Resilient secure channels
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
New signature schemes with coupons and tight reduction
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Robust and simple authentication protocol for secure communication on the web
ICWE'05 Proceedings of the 5th international conference on Web Engineering
Protecting user data in ubiquitous computing: towards trustworthy environments
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
A tutorial on physical security and side-channel attacks
Foundations of Security Analysis and Design III
Static analysis of authentication
Foundations of Security Analysis and Design III
Two new fast methods for simultaneous scalar multiplication in elliptic curve cryptosystems
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
PKM: a pairwise key management scheme for wireless sensor networks
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Designing secure indexes for encrypted databases
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Verified query results from hybrid authentication trees
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Fast and reliable random number generators for scientific computing
PARA'04 Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing
Combining message encryption and authentication
Annales UMCS, Informatica - Cryptography and data protection
Relationships between diffie-hellman and “index oracles”
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
The decimated sample based improved algebraic attacks on the nonlinear filters
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Non-randomness of the full 4 and 5-pass HAVAL
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
How to embed short cycles into large nonlinear feedback-shift registers
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
A study of the security of unbalanced oil and vinegar signature schemes
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
A fast correlation attack on the shrinking generator
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
On tolerant cryptographic constructions
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Evaluating 2-DNF formulas on ciphertexts
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Data authenticity and availability in multihop wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Fault cryptanalysis of elgamal signature scheme
EUROCAST'05 Proceedings of the 10th international conference on Computer Aided Systems Theory
Protocol analysis for concrete environments
EUROCAST'05 Proceedings of the 10th international conference on Computer Aided Systems Theory
ThresPassport – a distributed single sign-on service
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
A step towards practical steganography systems
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
A new efficient fingerprint-based remote user authentication scheme for multimedia systems
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Flaws in generic watermarking protocols based on zero-knowledge proofs
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Towards the public but noninvertible watermarking
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Efficient authenticated key agreement protocol for dynamic groups
WISA'04 Proceedings of the 5th international conference on Information Security Applications
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Compulsion resistant anonymous communications
IH'05 Proceedings of the 7th international conference on Information Hiding
An IP address anonymization scheme with multiple access levels
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Authentication based on singular cellular automata
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
A protocol to provide assurance of images integrity using memory cellular automata
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
Arbitrated verifier signature with message recovery for proof of ownership
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Improved preimage attack on one-block MD4
Journal of Systems and Software
Attribute-based strong designated-verifier signature scheme
Journal of Systems and Software
Improving the dynamic ID-Based remote mutual authentication scheme
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
General principles of algebraic attacks and new design criteria for cipher components
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
The inverse s-box, non-linear polynomial relations and cryptanalysis of block ciphers
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Trust enforcement in peer-to-peer massive multi-player online games
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part II
Query optimization in encrypted database systems
DASFAA'05 Proceedings of the 10th international conference on Database Systems for Advanced Applications
On the security of a certified e-mail scheme with temporal authentication
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
A simple acceptance/rejection criterium for sequence generators in symmetric cryptography
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
LIPS: lightweight internet permit system for stopping unwanted packets
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Self-configurable key pre-distribution in mobile ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Interoperation between a conventional PKI and an ID-Based infrastructure
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
A lower-bound of complexity for RSA-Based password-authenticated key exchange
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
On the discrete logarithm problem on algebraic tori
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
The conditional correlation attack: a practical attack on bluetooth encryption
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Privacy-preserving set operations
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
HMQV: a high-performance secure diffie-hellman protocol
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Probabilistic analyses on finding optimal combinations of primality tests in real applications
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Recard: using recommendation cards approach for building trust in peer-to-peer networks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Efficient cooperative signatures: a novel authentication scheme for sensor networks
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Second preimages on n-bit hash functions for much less than 2n work
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
On the impossibility of highly-efficient blockcipher-based hash functions
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Multi-modal biometrics with PKI technologies for border control applications
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Robust authenticated encryption scheme with message linkages
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV
Weak key analysis and micro-controller implementation of CA stream ciphers
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV
Performance-oriented privacy-preserving data integration
DILS'05 Proceedings of the Second international conference on Data Integration in the Life Sciences
Secure protected password change scheme
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Energy-efficient software implementation of long integer modular arithmetic
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Hardware/software co-design for hyperelliptic curve cryptography (HECC) on the 8051 µP
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Design of testable random bit generators
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Fast truncated multiplication for cryptographic applications
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
ID-based multi-party authenticated key agreement protocols from multilinear forms
ISC'05 Proceedings of the 8th international conference on Information Security
Error oracle attacks on CBC mode: is there a future for CBC mode encryption?
ISC'05 Proceedings of the 8th international conference on Information Security
A cryptographic solution for general access control
ISC'05 Proceedings of the 8th international conference on Information Security
ECvisual: a visualization tool for elliptic curve based ciphers
Proceedings of the 43rd ACM technical symposium on Computer Science Education
Hybrid verification of a hardware modular reduction engine
Proceedings of the International Conference on Formal Methods in Computer-Aided Design
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Tripartite key exchange in the canetti-krawczyk proof model
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Chosen ciphertext attack on a new class of self-synchronizing stream ciphers
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Faster variants of the MESH block ciphers
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Exact analysis of montgomery multiplication
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Algebraic attacks on combiners with memory and several outputs
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
An efficient and verifiable solution to the millionaire problem
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Efficient computation of tate pairing in projective coordinate over general characteristic fields
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Provably secure double-block-length hash functions in a black-box model
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Identity-Based access control for ad hoc groups
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users
Wireless Personal Communications: An International Journal
A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs)
Electronic Commerce Research
A public key cryptosystem based on three new provable problems
Theoretical Computer Science
On the power generator and its multivariate analogue
Journal of Complexity
FLUX: content and structure matching of XPath queries with range predicates
XSym'06 Proceedings of the 4th international conference on Database and XML Technologies
Parsimony-Based approach for obtaining resource-efficient and trustworthy execution
LADC'05 Proceedings of the Second Latin-American conference on Dependable Computing
Cryptanalysis of two user identification schemes with key distribution preserving anonymity
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Timing-sensitive information flow analysis for synchronous systems
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Using sphinx to improve onion routing circuit construction
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
On robust key agreement based on public key authentication
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Key independent decryption of graphically encrypted images
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Security weaknesses of certain broadcast encryption schemes
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
A novel broadcast encryption based on time-bound cryptographic keys
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Design of a secure digital contents delivery system in p2p networks
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Non-group cellular automata based one time password authentication scheme in wireless networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
“Fair” authentication in pervasive computing
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Nonlinear complexity of binary sequences and connections with lempel-ziv compression
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
A hardware-implemented truly random key generator for secure biometric authentication systems
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
A protocol for secure public instant messaging
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
An efficient publicly verifiable mix-net for long inputs
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
About the security of MTI/C0 and MQV
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
A new key exchange protocol based on MQV assuming public computations
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Distinguishing stream ciphers with convolutional filters
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
On the higher order nonlinearities of algebraic immune functions
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Applications of SAT solvers to cryptanalysis of hash functions
SAT'06 Proceedings of the 9th international conference on Theory and Applications of Satisfiability Testing
PATMOS'06 Proceedings of the 16th international conference on Integrated Circuit and System Design: power and Timing Modeling, Optimization and Simulation
Power modeling of precharged address bus and application to multi-bit DPA attacks to DES algorithm
PATMOS'06 Proceedings of the 16th international conference on Integrated Circuit and System Design: power and Timing Modeling, Optimization and Simulation
Techniques to enhance the resistance of precharged busses to differential power analysis
PATMOS'06 Proceedings of the 16th international conference on Integrated Circuit and System Design: power and Timing Modeling, Optimization and Simulation
Low-reiter: niederreiter encryption scheme for embedded microcontrollers
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
An implementation of a mix-net based network voting scheme and its use in a private organization
Towards Trustworthy Elections
On pseudorandom sequences and their application
General Theory of Information Transfer and Combinatorics
Enforcing the security of a time-bound hierarchical key assignment scheme
Information Sciences: an International Journal
Fragile watermarking tamper detection with images compressed by fuzzy transform
Information Sciences: an International Journal
A crypto-biometric scheme based on iris-templates with fuzzy extractors
Information Sciences: an International Journal
Computing elliptic curve discrete logarithms with the negation map
Information Sciences: an International Journal
Characteristic set algorithms for equation solving in finite fields
Journal of Symbolic Computation
Journal of Computational and Applied Mathematics
Strongly unforgeable signatures based on computational diffie-hellman
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Highly reliable synchronous stream cipher system for link encryption
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
BGN authentication and its extension to convey message commitments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Application of LFSRs for parallel sequence generation in cryptologic algorithms
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Design and implementation of an FPGA-Based 1.452-gbps non-pipelined AES architecture
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
On the security of the authentication module of chinese WLAN standard implementation plan
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Public key cryptography sans certificates in ad hoc networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Maple implementation of the chor-rivest cryptosystem
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part II
Security analysis of the strong diffie-hellman problem
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Towards provable security for ubiquitous applications
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Forgery and key recovery attacks on PMAC and mitchell's TMAC variant
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Efficient implementation of zero-knowledge proofs for watermark detection in multimedia data
Transactions on Data Hiding and Multimedia Security I
State machine replication with byzantine faults
Replication
A new encryption and hashing scheme for the security architecture for microprocessors
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
On algebraic immunity and annihilators
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
A simpler sieving device: combining ECM and TWIRL
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Cryptanalysis of t-function-based hash functions
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
A key management scheme with encoding and improved security for wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Design of key establishment protocol using one-way functions to avert insider-replay attack
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Identification in infrastructureless networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Predicting secret keys via branch prediction
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Efficient password-authenticated key exchange based on RSA
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Public key cryptography and RFID tags
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Efficient CRT-RSA decryption for small encryption exponents
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
On the linearity of cryptographic sequence generators
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part II
A smart card implementation of the mceliece PKC
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Design and analysis of a generalized canvas protocol
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
The polynomial composition problem in (Z/nZ)[X]
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Simple power analysis on exponentiation revisited
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Anonymous credentials for java enabled platforms: a performance evaluation
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Robust approaches to 3d object secret sharing
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part I
Security in opensocial-instrumented social networking services
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Secure communication using identity based encryption
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Privacy-Preserving network aggregation
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Measuring random tests by conditional entropy and optimal execution order
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Modelling of process of electronic signature with petri nets and (max, plus) algebra
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
A new secret sharing scheme for images based on additive 2-dimensional cellular automata
IbPRIA'05 Proceedings of the Second Iberian conference on Pattern Recognition and Image Analysis - Volume Part I
Verifying security protocols: an application of CSP
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
Application of LFSRs in time/memory trade-off cryptanalysis
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Practical modifications of leadbitter et al.'s repeated-bits side-channel analysis on (EC)DSA
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Hash based digital signature schemes
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Partial key recovery attacks on XCBC, TMAC and OMAC
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Domain expansion of MACs: alternative uses of the FIL-MAC
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Concrete security of the blum-blum-shub pseudorandom generator
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Off-Line micro-payment system for content sharing in p2p networks
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
Location privacy for cellular systems; analysis and solution
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Threshold and proactive pseudo-random permutations
TCC'06 Proceedings of the Third conference on Theory of Cryptography
An efficient public key cryptosystem with a privacy enhanced double decryption mechanism
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Breaking a new hash function design strategy called SMASH
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Forward secure communication in wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Higher dependability and security for mobile applications
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Improvements to mitchell's remote user authentication protocol
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Ambiguity attacks on the ganic-eskicioglu robust DWT-SVD image watermarking scheme
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
A variant of schnorr identity-based identification scheme with tight reduction
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
A new spin on quantum cryptography: avoiding trapdoors and embracing public keys
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
Self-similarity attacks on block ciphers and application to keeloq
Cryptography and Security
Secret key leakage from public key perturbation of DLP-Based cryptosystems
Cryptography and Security
On the security of an novel protocol for downloadable CAS
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
Congestion lower bounds for secure in-network aggregation
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Speeding up a chaos-based image encryption algorithm using GPGPU
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part I
Method of generating irreducible polynomials over GF(3) on the basis of trinomials
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part II
Preimage attacks on Full-ARIRANG: analysis of DM-Mode with middle feed-forward
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Order-Preserving encryption for non-uniformly distributed plaintexts
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Four authorization protocols for an electronic payment system
MEMICS'11 Proceedings of the 7th international conference on Mathematical and Engineering Methods in Computer Science
Modeling long-term signature validation for resolution of dispute
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
Elliptic curve cryptography on the WISP UHF RFID tag
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
An automatic, time-based, secure pairing protocol for passive RFID
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Redundant modular reduction algorithms
CARDIS'11 Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
Implementing the 4-dimensional GLV method on GLS elliptic curves with j-invariant 0
Designs, Codes and Cryptography
A simple stream cipher with proven properties
Cryptography and Communications
SP 800-21 Second edition. Guideline for Implementing Cryptography in the Federal Government
SP 800-21 Second edition. Guideline for Implementing Cryptography in the Federal Government
SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques
SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques
SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication
SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication
Integration, the VLSI Journal
An Efficient Finite Field Multiplier Using Redundant Representation
ACM Transactions on Embedded Computing Systems (TECS)
Quantum McEliece public-key cryptosystem
Quantum Information & Computation
Automated monitoring of medical protocols: a secure and distributed architecture
Artificial Intelligence in Medicine
Type checking cryptography implementations
FSEN'11 Proceedings of the 4th IPM international conference on Fundamentals of Software Engineering
Mobile one-time passwords: two-factor authentication using mobile phones
Security and Communication Networks
ACM Transactions on Information and System Security (TISSEC)
Certifying assembly with formal security proofs: The case of BBS
Science of Computer Programming
Cryptographic applications of 3x3 block upper triangular matrices
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
An efficient multi-receipt mechanism for uncoercible anonymous electronic voting
Mathematical and Computer Modelling: An International Journal
Cryptanalyses on a merkle-damgård based MAC -- almost universal forgery and distinguishing-h attacks
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Novel orbit based symmetric cryptosystems
Mathematical and Computer Modelling: An International Journal
Breaking an orbit-based symmetric cryptosystem
Mathematical and Computer Modelling: An International Journal
Securing digital signatures for non-repudiation
Computer Communications
Survey: Combating online in-auction fraud: Clues, techniques and challenges
Computer Science Review
Unique file identification in the National Software Reference Library
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Virtual network stacks: from theory to practice
Security and Communication Networks
Energy efficiency of encryption schemes applied to wireless sensor networks
Security and Communication Networks
Computing the modular inverses is as simple as computing the GCDs
Finite Fields and Their Applications
Polynomial representations of the Lucas logarithm
Finite Fields and Their Applications
Finite Fields and Their Applications
Editorial: A decade of Finite Fields and Their Applications
Finite Fields and Their Applications
A non-associative lattice-based public key cryptosystem
Security and Communication Networks
TrustSplit: usable confidentiality for social network messaging
Proceedings of the 23rd ACM conference on Hypertext and social media
Security of message authentication codes in the presence of key-dependent messages
Designs, Codes and Cryptography
Pseudorandom number generators based on random covers for finite groups
Designs, Codes and Cryptography
PKI Security in Large-Scale Healthcare Networks
Journal of Medical Systems
Analyzing the Secure Simple Pairing in Bluetooth v4.0
Wireless Personal Communications: An International Journal
Anonymous overlay network supporting authenticated routing
Information Sciences: an International Journal
GLP: A cryptographic approach for group location privacy
Computer Communications
Transaction-based authentication and key agreement protocol for inter-domain VoIP
Journal of Network and Computer Applications
Improved Pollard rho method for computing discrete logarithms over finite extension fields
Journal of Computational and Applied Mathematics
Security network interface for alarm systems
Computer Standards & Interfaces
Keyed hash function based on a dynamic lookup table of functions
Information Sciences: an International Journal
Chosen-prefix collisions for MD5 and applications
International Journal of Applied Cryptography
Multi-layer security analysis and experimentation of high speed protocol data transfer for GRID
International Journal of Grid and Utility Computing
Scalable Gaussian Normal Basis Multipliers over GF(2m) Using Hankel Matrix-Vector Representation
Journal of Signal Processing Systems
The PASSERINE public key encryption and authentication mechanism
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Identity-Based key derivation method for low delay inter-domain handover re-authentication service
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
A PKI-Based mobile banking demonstrator
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
A new scan attack on RSA in presence of industrial countermeasures
COSADE'12 Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design
RSA key generation: new attacks
COSADE'12 Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design
The schindler-itoh-attack in case of partial information leakage
COSADE'12 Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design
Computationally-Fair group and identity-based key-exchange
TAMC'12 Proceedings of the 9th Annual international conference on Theory and Applications of Models of Computation
Efficient java implementation of elliptic curve cryptography for J2ME-Enabled mobile devices
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
A robust e-commerce service: Light-weight secure mail-order mechanism
Electronic Commerce Research and Applications
Towards parallel direct SAT-based cryptanalysis
PPAM'11 Proceedings of the 9th international conference on Parallel Processing and Applied Mathematics - Volume Part I
Security analysis of a multi-factor authenticated key exchange protocol
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
iHTTP: efficient authentication of non-confidential HTTP traffic
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Hashing with elliptic curve L-functions
WAIFI'12 Proceedings of the 4th international conference on Arithmetic of Finite Fields
Approximate privacy-preserving data mining on vertically partitioned data
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Attack based on direct sum decomposition against the nonlinear filter generator
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
A complementary analysis of the (s)YZ and DIKE protocols
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
The collision security of MDC-4
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
SPN-hash: improving the provable resistance against differential collision attacks
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Weimar-DM: a highly secure double-length compression function
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Data node encrypted file system: efficient secure deletion for flash memory
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Evaluation of a PUF device authentication scheme on a discrete 0.13um SRAM
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Improved integral analysis on tweaked lesamnta
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Weaknesses in current RSA signature schemes
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Synthetic linear analysis: improved attacks on cubehash and rabbit
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Preimage attacks on step-reduced SM3 hash function
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem
Fundamenta Informaticae
On the d-ary generalized legendre-sidelnikov sequence
SETA'12 Proceedings of the 7th international conference on Sequences and Their Applications
Modelling and Checking Timed Authentication of Security Protocols
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Experimenting with fast private set intersection
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem
Fundamenta Informaticae
Free vs. transcribed text for keystroke-dynamics evaluations
Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results
Ace: an efficient key-exchange protocol for onion routing
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Genodroid: are privacy-preserving genomic tests ready for prime time?
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Remarks on Pseudorandom Binary Sequences Over Elliptic Curves
Fundamenta Informaticae - Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo Poland, 2010
SAPDS: self-healing attribute-based privacy aware data sharing in cloud
The Journal of Supercomputing
Analog Integrated Circuits and Signal Processing
Secure Communication of Medical Information Using Mobile Agents
Journal of Medical Systems
Pasture: secure offline data access using commodity trusted hardware
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
A study on data deduplication in HPC storage systems
SC '12 Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis
Tsunami: massively parallel homomorphic hashing on many-core GPUs
Concurrency and Computation: Practice & Experience
Sensor network security for pervasive e-health
Security and Communication Networks
Enhanced authentication for commercial video services
Security and Communication Networks
A special purpose integer factorization algorithm
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Information confinement, privacy, and security in RFID systems
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Insider attacks enabling data broadcasting on crypto-enforced unicast links
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Implementing cryptographic pairings
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Implementing cryptographic pairings over barreto-naehrig curves
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
The importance of the final exponentiation in pairings when considering fault attacks
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Privacy-preserving revocation checking with modified CRLs
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
OpenHSM: an open key life cycle protocol for public key infrastructure's hardware security modules
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Security analysis of constructions combining FIL random oracles
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
ICALP'07 Proceedings of the 34th international conference on Automata, Languages and Programming
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Impossible-differential attacks on large-block Rijndael
ISC'07 Proceedings of the 10th international conference on Information Security
Improvement of trace-driven I-Cache timing attack on the RSA algorithm
Journal of Systems and Software
On the combination of self-organized systems to generate pseudo-random numbers
Information Sciences: an International Journal
Secure chaotic system with application to chaotic ciphers
Information Sciences: an International Journal
On the nonlinearity of maximum-length NFSR feedbacks
Cryptography and Communications
Duplicate detection in pay-per-click streams using temporal stateful Bloom filters
International Journal of Data Analysis Techniques and Strategies
Journal of Computer and System Sciences
Cryptanalysis of Álvarez et al. key exchange scheme
Information Sciences: an International Journal
Blind 384-bit digital signature scheme
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
On the sosemanuk related Key-IV sets
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
On the (in)security of IDEA in various hashing modes
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Converting meet-in-the-middle preimage attack into pseudo collision attack: application to SHA-2
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Pushing the limits of high-speed GF(2m) elliptic curve scalar multiplication on FPGAs
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics
Security and Communication Networks
Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy
Security and Communication Networks
Memoryless near-collisions, revisited
Information Processing Letters
Low-power and high-speed design of a versatile bit-serial multiplier in finite fields GF(2m)
Integration, the VLSI Journal
From orthogonal projections to a generalized quantum search
Quantum Information Processing
Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
A Roadmap to the Introduction of Pervasive Information Systems in Healthcare
International Journal of Advanced Pervasive and Ubiquitous Computing
Information Sciences: an International Journal
Managing context data for diverse operating spaces
Pervasive and Mobile Computing
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Generic related-key attacks for HMAC
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
An innovative electronic group-buying system for mobile commerce
Electronic Commerce Research and Applications
Image encryption process based on chaotic synchronization phenomena
Signal Processing
Secure event logging in sensor networks
Computers & Mathematics with Applications
Improving timing attack on RSA-CRT via error detection and correction strategy
Information Sciences: an International Journal
New identity-based three-party authenticated key agreement protocol with provable security
Journal of Network and Computer Applications
Server-aided signatures verification secure against collusion attack
Information Security Tech. Report
Lightweight privacy-preserving peer-to-peer data integration
Proceedings of the VLDB Endowment
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Security-aware optimization for ubiquitous computing systems with SEAT graph approach
Journal of Computer and System Sciences
A symmetric polynomial-based mutual authentication protocol for GSM networks
International Journal of Security and Networks
Improved (and practical) public-key authentication for UHF RFID tags
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
Anonymity and one-way authentication in key exchange protocols
Designs, Codes and Cryptography
Information Sciences: an International Journal
Private data warehouse queries
Proceedings of the 18th ACM symposium on Access control models and technologies
A combination of blind source separation and impulsive chaos synchronisation for encryption
International Journal of Autonomous and Adaptive Communications Systems
Lightweight authentication of linear algebraic queries on data streams
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
Proceedings of the 14th ACM SIGPLAN/SIGBED conference on Languages, compilers and tools for embedded systems
Approximately counting semismooth integers
Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation
Secure Transmission of Mobile Agent in Dynamic Distributed Environments
Wireless Personal Communications: An International Journal
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Digital Signal Processing
Verifiable and private top-k monitoring
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
A programmable look-up table-based interpolator with nonuniform sampling scheme
International Journal of Reconfigurable Computing
Secure content delivery in information-centric networks: design, implementation, and analyses
Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking
Amplitude demodulation-based EM analysis of different RSA implementations
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
FORTUNA-A framework for the design and development of hardware-based secure systems
Journal of Systems and Software
Image encryption using a new parametric switching chaotic system
Signal Processing
A novel differential scan attack on advanced DFT structures
ACM Transactions on Design Automation of Electronic Systems (TODAES) - Special Section on Networks on Chip: Architecture, Tools, and Methodologies
User requirements-aware security ranking in SSL protocol
The Journal of Supercomputing
Multimedia Tools and Applications
Utilization of Pipeline Technique in AOP Based Multipliers with Parallel Inputs
Journal of Signal Processing Systems
Attacks on Confidentiality of Communications Between Stranger Organizations
International Journal of Knowledge-Based Organizations
An Integrated Handover Authentication for FMIPv6 Over Heterogeneous Access Link Technologies
Wireless Personal Communications: An International Journal
FPGA based unified architecture for public key and private key cryptosystems
Frontiers of Computer Science: Selected Publications from Chinese Universities
Fault Analysis and Evaluation of a True Random Number Generator Embedded in a Processor
Journal of Electronic Testing: Theory and Applications
Minimalist security and privacy schemes based on enhanced AES for integrated WISP sensor networks
International Journal of Communication Networks and Distributed Systems
Towards a secure human-and-computer mutual authentication protocol
AISC '12 Proceedings of the Tenth Australasian Information Security Conference - Volume 125
International Journal of Information and Computer Security
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
OAKE: a new family of implicitly authenticated diffie-hellman protocols
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Using SMT solvers to automate design tasks for encryption and signature schemes
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
More efficient oblivious transfer and extensions for faster secure computation
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Securing ZigBee smart energy profile 1.x with OpenECC library
Proceedings of the first ACM workshop on Smart energy grid security
Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Proceedings of the 2013 ACM workshop on Digital identity management
Preimage attacks on Feistel-SP functions: impact of omitting the last network twist
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Public key exchange using semidirect product of (semi)groups
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Scaling laws of associative memory retrieval
Neural Computation
An approach for designing neural cryptography
ISNN'13 Proceedings of the 10th international conference on Advances in Neural Networks - Volume Part I
An improved fault-tolerant conference-key agreement protocol with forward secrecy
Proceedings of the 6th International Conference on Security of Information and Networks
Public key infrastructure for UAE: a case study
Proceedings of the 6th International Conference on Security of Information and Networks
Updated recommendations for blinded exponentiation vs. single trace analysis
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
A chaotic neural network-based encryption algorithm for MPEG-2 encoded video signal
International Journal of Artificial Intelligence and Soft Computing
Efficiency and security in similarity cloud services
Proceedings of the VLDB Endowment
RSAvisual: a visualization tool for the RSA cipher
Proceedings of the 45th ACM technical symposium on Computer science education
French team invents faster code-breaking algorithm
Communications of the ACM
Non-Interactive Authenticated Key Agreement over the Mobile Communication Network
Mobile Networks and Applications
Reverse Authentication in Financial Transactions and Identity Management
Mobile Networks and Applications
ACM SIGSOFT Software Engineering Notes
Two RFID Standard-based Security Protocols for Healthcare Environments
Journal of Medical Systems
A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce
Journal of Medical Systems
A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Message blinding method requiring no multiplicative inversion for RSA
ACM Transactions on Embedded Computing Systems (TECS)
Journal of Medical Systems
Accelerating incremental checkpointing for extreme-scale computing
Future Generation Computer Systems
A bio-cryptographic system based on offline signature images
Information Sciences: an International Journal
Security weaknesses of a signature scheme and authenticated key agreement protocols
Information Processing Letters
Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography
Computer Standards & Interfaces
An agent-based approach for the design and analysis of content delivery networks
Journal of Network and Computer Applications
Improved migration for mobile computing in distributed networks
Computer Standards & Interfaces
Cryptanalysis of a key agreement protocol based on chaotic Hash
International Journal of Electronic Security and Digital Forensics
Online XOR packet coding: Efficient single-hop wireless multicasting with low decoding delay
Computer Communications
Wireless Personal Communications: An International Journal
Provably secure three-party authenticated key agreement protocol using smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
Journal of Network and Computer Applications
One-insider attack of quantum secret sharing protocol with collective eavesdropping-check
Quantum Information Processing
An efficient privacy-preserving solution for finding the nearest doctor
Personal and Ubiquitous Computing
A novel construction of SDVS with secure disavowability
Cluster Computing
Efficient leakage-resilient public key encryption from DDH assumption
Cluster Computing
Towards Privacy Protection in Smart Grid
Wireless Personal Communications: An International Journal
Rethinking Stream Ciphers: Can Extracting be Better than Expanding?
Wireless Personal Communications: An International Journal
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme
Wireless Personal Communications: An International Journal
End-to-end policy based encryption techniques for multi-party data management
Computer Standards & Interfaces
MILo-DB: a personal, secure and portable database machine
Distributed and Parallel Databases
Analysing TLS in the strand spaces model
Journal of Computer Security
On the probability of generating a lattice
Journal of Symbolic Computation
Cubic Sieve Congruence of the Discrete Logarithm Problem, and fractional part sequences
Journal of Symbolic Computation
Hi-index | 0.59 |
From the Publisher:A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper.