Cryptography: Policy and Algorithms最新文献

筛选
英文 中文
Integrating Smart Cards Into Authentication Systems 集成智能卡到认证系统
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032365
Gary Gaskell, M. Looi
{"title":"Integrating Smart Cards Into Authentication Systems","authors":"Gary Gaskell, M. Looi","doi":"10.1007/BFb0032365","DOIUrl":"https://doi.org/10.1007/BFb0032365","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122195639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cryptographic APIs 加密api
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032367
D. Gollmann
{"title":"Cryptographic APIs","authors":"D. Gollmann","doi":"10.1007/BFb0032367","DOIUrl":"https://doi.org/10.1007/BFb0032367","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124529089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Note on Nonuniform Decimation of Periodic Sequences 关于周期序列非均匀抽取的一个注记
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032352
J. Golic
{"title":"A Note on Nonuniform Decimation of Periodic Sequences","authors":"J. Golic","doi":"10.1007/BFb0032352","DOIUrl":"https://doi.org/10.1007/BFb0032352","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123078563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Key Escrow Cryptosystem 一种新的密钥托管密码系统
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032350
He Jingmin, E. Dawson
{"title":"A New Key Escrow Cryptosystem","authors":"He Jingmin, E. Dawson","doi":"10.1007/BFb0032350","DOIUrl":"https://doi.org/10.1007/BFb0032350","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122925266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A New Identification Algorithm 一种新的识别算法
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032363
Kefei Chen
{"title":"A New Identification Algorithm","authors":"Kefei Chen","doi":"10.1007/BFb0032363","DOIUrl":"https://doi.org/10.1007/BFb0032363","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122343170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Cryptanalysis of the Enhanced ElGamal's Signature Scheme 增强型ElGamal签名方案的密码分析
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032361
C. Laih, W. Kuo
{"title":"Cryptanalysis of the Enhanced ElGamal's Signature Scheme","authors":"C. Laih, W. Kuo","doi":"10.1007/BFb0032361","DOIUrl":"https://doi.org/10.1007/BFb0032361","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114280024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Card with Interferometric Quantum Cryptography Device 带有干涉量子密码装置的智能卡
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032366
J. Hruby
{"title":"Smart Card with Interferometric Quantum Cryptography Device","authors":"J. Hruby","doi":"10.1007/BFb0032366","DOIUrl":"https://doi.org/10.1007/BFb0032366","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124151779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps 多步时钟控制移位寄存器的密码分析
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032357
J. Golic, L. O'Connor
{"title":"A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps","authors":"J. Golic, L. O'Connor","doi":"10.1007/BFb0032357","DOIUrl":"https://doi.org/10.1007/BFb0032357","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122038783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Multiple Encryption with Minimum Key 使用最小密钥进行多重加密
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032355
I. Damgård, L. Knudsen
{"title":"Multiple Encryption with Minimum Key","authors":"I. Damgård, L. Knudsen","doi":"10.1007/BFb0032355","DOIUrl":"https://doi.org/10.1007/BFb0032355","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122364939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
How to Fairly Reconstruct a Shared Secret 如何公平地重构共享秘密
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032351
He Jingmin, E. Dawson
{"title":"How to Fairly Reconstruct a Shared Secret","authors":"He Jingmin, E. Dawson","doi":"10.1007/BFb0032351","DOIUrl":"https://doi.org/10.1007/BFb0032351","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124831520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信