Proceedings of the 4th ACM conference on Computer and communications security
Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
Reflection as a mechanism for software integrity verification
ACM Transactions on Information and System Security (TISSEC)
The development of a distributed capability system for VLOS
CRPIT '02 Proceedings of the seventh Asia-Pacific conference on Computer systems architecture
Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
A New Statistical Testing for Symmetric Ciphers and Hash Functions
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
HAS-V: A New Hash Function with Variable Output Length
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
New (Two-Track-)MAC Based on the Two Trails of RIPEMD
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers
ECMAST '99 Proceedings of the 4th European Conference on Multimedia Applications, Services and Techniques
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
How Role Based Access Control is Implemented in SESAME
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
Performance Analysis and Parallel Implementation of Dedicated Hash Functions
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Unconditionally Secure Digital Signature Schemes Admitting Transferability
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Practice-Oriented Provable Security
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
The State of Cryptographic Hash Functions
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Recent Developments in the Design of Conventional Cryptographic Algorithms
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Cryptographic Primitives for Information Authentication - State of the Art
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Fast Hashing and Stream Encryption with PANAMA
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
New Constructions for Secure Hash Functions
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
Environmental Key Generation Towards Clueless Agents
Mobile Agents and Security
Hash Functions and the MAC Using All-or-Nothing Property
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Implementation of the SHA-2 Hash Family Standard Using FPGAs
The Journal of Supercomputing
A proposed curriculum of cryptography courses
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
A compact FPGA implementation of the hash function whirlpool
Proceedings of the 2006 ACM/SIGDA 14th international symposium on Field programmable gate arrays
High-Speed FPGA Implementation of Secure Hash Algorithm for IPSec and VPN Applications
The Journal of Supercomputing
Multi-mode operator for SHA-2 hash functions
Journal of Systems Architecture: the EUROMICRO Journal
ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS
Integration, the VLSI Journal - Special issue: Embedded cryptographic hardware
Hashchip: a shared-resource multi-hash function processor architecture on FPGA
Integration, the VLSI Journal - Special issue: Embedded cryptographic hardware
Meaningful electronic signatures based on an automatic indexing method
Artificial Intelligence and Law
Remotely keyed encryption using non-encrypting smart cards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Cryptographic support for secure logs on untrusted machines
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Mobile Networks and Applications
Parallel white noise generation on a GPU via cryptographic hash
Proceedings of the 2008 symposium on Interactive 3D graphics and games
Calculemus '07 / MKM '07 Proceedings of the 14th symposium on Towards Mechanized Mathematical Assistants: 6th International Conference
Fast Software Encryption
Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class
Journal of Signal Processing Systems
Side Channel Attacks against Hash-Based MACs with PGV Compression Functions
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
The State of Hash Functions and the NIST SHA-3 Competition
Information Security and Cryptology
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
On the hardware implementation of RIPEMD processor: Networking high speed hashing, up to 2Gbps
Computers and Electrical Engineering
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Finding Collisions for a 45-Step Simplified HAS-V
Information Security Applications
Recent developments in cryptographic hash functions: Security implications and future directions
Information Security Tech. Report
A new paradigm for collision-free hashing: incrementality at reduced cost
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
SHA: a design for parallel architectures?
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Software performance of universal hash functions
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Content-based image watermarking via public-key cryptosystems
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Adding integrity verification capabilities to the LDPC-staircase erasure correction codes
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
An embedded platform for privacy-friendly road charging applications
Proceedings of the Conference on Design, Automation and Test in Europe
Improved differential attacks for ECHO and Grøstl
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
PrETP: privacy-preserving electronic toll pricing
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Cryptographic hash functions: theory and practice
ICICS'10 Proceedings of the 12th international conference on Information and communications security
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Solving the MANET autoconfiguration problem using the 802.11 SSID field
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
A web services based architecture for digital time stamping
Journal of Web Engineering
The NIST SHA-3 competition: a perspective on the final year
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Distinguishing attacks on LPMAC based on the full RIPEMD and reduced-step RIPEMD-{256, 320}
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
Collision attack for the hash function extended MD4
ICICS'11 Proceedings of the 13th international conference on Information and communications security
On the collision resistance of RIPEMD-160
ISC'06 Proceedings of the 9th international conference on Information Security
A failure-friendly design principle for hash functions
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
SMASH – a cryptographic hash function
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Security analysis of a 2/3-rate double length compression function in the black-box model
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Logiweb: a system for web publication of mathematics
ICMS'06 Proceedings of the Second international conference on Mathematical Software
A new dedicated 256-bit hash function: FORK-256
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
ECRYPT: the cryptographic research challenges for the next decade
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Cryptanalysis of the hash functions MD4 and RIPEMD
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
How to break MD5 and other hash functions
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Second preimages on n-bit hash functions for much less than 2n work
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
On the security of encryption modes of MD4, MD5 and HAVAL
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
New proofs for NMAC and HMAC: security without collision-resistance
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Side channel attacks against HMACs based on block-cipher based hash functions
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
The first 30 years of cryptographic hash functions and the NIST SHA-3 competition
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Modelling of process of electronic signature with petri nets and (max, plus) algebra
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Modifications of SHA-0 to prevent attacks
ICISS'05 Proceedings of the First international conference on Information Systems Security
A novel time-memory trade-off method for password recovery
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A low-cost alternative for OAEP
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systemss
Distinguishers beyond three rounds of the RIPEMD-128/-160 compression functions
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Efficient negative databases from cryptographic hash functions
ISC'07 Proceedings of the 10th international conference on Information Security
Allowing continuous evaluation of citizen opinions through social networks
EGOVIS'12/EDEM'12 Proceedings of the 2012 Joint international conference on Electronic Government and the Information Systems Perspective and Electronic Democracy, and Proceedings of the 2012 Joint international conference on Advancing Democracy, Government and Governance
Differential attacks on reduced RIPEMD-160
ISC'12 Proceedings of the 15th international conference on Information Security
The security impact of a new cryptographic library
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Collision attacks on the reduced dual-stream hash function RIPEMD-128
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Seamless MANET autoconfiguration through enhanced 802.11 beaconing
Mobile Information Systems
Hi-index | 0.00 |