Is the data encryption standard a group?
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Communications of the ACM
Data communications at the national physical laboratory (1965-1975)
IEEE Annals of the History of Computing
Manipulations and errors, detection and localization
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
The shortest feedback shift register that can generate a given sequence
CRYPTO '89 Proceedings on Advances in cryptology
Authenticating Multicast Internet Electronic Mail Messages Using a Bidirectional MAC is Insecure
IEEE Transactions on Computers
Message authentication with one-way hash functions
ACM SIGCOMM Computer Communication Review
Integration of security in network routing protocols
ACM SIGSAC Review
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
IBM wireless RF LAN design and architecture
IBM Systems Journal
Human-computer cryptography: an attempt
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
A secure distributed capability based system (extended abstract)
ACM '85 Proceedings of the 1985 ACM annual conference on The range of computing : mid-80's perspective: mid-80's perspective
Security and privacy requirements in computing
ACM '86 Proceedings of 1986 ACM Fall joint computer conference
PKI: It's Not Dead, Just Resting
Computer
Design and Test of an Integrated Cryptochip
IEEE Design & Test
Is DES a Pure Cipher? (Results of More Cycling Experiments on DES)
CRYPTO '85 Advances in Cryptology
Security enhancement of an IC-card-based remote login mechanism
Computer Networks: The International Journal of Computer and Telecommunications Networking
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
The knapsack hash function proposed at Crypto'89 can be broken
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Enumerating nondegenerate permutations
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Human identification through insecure channel
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
On the Matsumoto and Imai's human identification scheme
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Physical protection of cryptographic devices
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
A brief survey of research jointly with jean-jacques quisquater
Cryptography and Security
Tutorial: Security in computer networks and distributed systems
Computer Communications
Hi-index | 0.02 |