Perfect cryptographic security from partially independent channels
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
Factoring with two large primes (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Distributed primality proving and the primality of (23539+1)/3
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Experimental quantum cryptography
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
On the existence of bit commitment schemes and zero-knowledge proofs
CRYPTO '89 Proceedings on Advances in cryptology
A particular solution to provide secure communications in an Ethernet environment
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
On the construction of pseudo-random permutations: Luby-Rackoff revisited (extended abstract)
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Oblivious transfer and polynomial evaluation
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Quantum Bit Commitment and Coin Tossing Protocols
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
A High-Speed DES Implementation for Network Applications
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Number-theoretic constructions of efficient pseudo-random functions
Journal of the ACM (JACM)
A proposed curriculum of cryptography courses
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
An introduction to quantum cryptography
Crossroads
Reengineering money: the Mondex stored value card and beyond
International Journal of Electronic Commerce
Image security system using recursive cellular automata substitution
Pattern Recognition
Efficient pseudorandom functions from the decisional linear assumption and weaker variants
Proceedings of the 16th ACM conference on Computer and communications security
On a class of key agreement protocols which cannot be unconditionally secure
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Algorithms and theory of computation handbook
Crypto topics and applications II
Algorithms and theory of computation handbook
Prototype of a quantum cryptography system for the end user
ACS'09 Proceedings of the 9th WSEAS international conference on Applied computer science
A key reshuffling scheme for wireless sensor networks
ICISS'05 Proceedings of the First international conference on Information Systems Security
Hi-index | 0.00 |