Cryptography: Policy and Algorithms最新文献

筛选
英文 中文
Keyed Hash Functions 键控哈希函数
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032359
S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk
{"title":"Keyed Hash Functions","authors":"S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk","doi":"10.1007/BFb0032359","DOIUrl":"https://doi.org/10.1007/BFb0032359","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123952282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A One-Key Cryptosystem Based on a Finite Nonlinear Automaton 基于有限非线性自动机的一键密码系统
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032356
M. Gysin
{"title":"A One-Key Cryptosystem Based on a Finite Nonlinear Automaton","authors":"M. Gysin","doi":"10.1007/BFb0032356","DOIUrl":"https://doi.org/10.1007/BFb0032356","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123168147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation 模幂快速服务器辅助秘密计算协议的主动攻击
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032360
Shin-Jia Hwang, Chinchen Chang, Wei-Pang Yang
{"title":"Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation","authors":"Shin-Jia Hwang, Chinchen Chang, Wei-Pang Yang","doi":"10.1007/BFb0032360","DOIUrl":"https://doi.org/10.1007/BFb0032360","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"41 39","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133390316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Discrete Optimisation and Fast Correlation Attacks 离散优化和快速相关攻击
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032358
J. Golic, M. Salmasizadeh, A. Clark, A. Khodkar, E. Dawson
{"title":"Discrete Optimisation and Fast Correlation Attacks","authors":"J. Golic, M. Salmasizadeh, A. Clark, A. Khodkar, E. Dawson","doi":"10.1007/BFb0032358","DOIUrl":"https://doi.org/10.1007/BFb0032358","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124640201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Crypto in Europe - Markets, Law and Policy 加密货币在欧洲-市场,法律和政策
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032347
Ross J. Anderson
{"title":"Crypto in Europe - Markets, Law and Policy","authors":"Ross J. Anderson","doi":"10.1007/BFb0032347","DOIUrl":"https://doi.org/10.1007/BFb0032347","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116235764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Foiling Active Network Impersonisation Attacks Made in Collusion with an Insider 挫败与内部人员勾结的主动网络冒充攻击
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032368
S. Russell
{"title":"Foiling Active Network Impersonisation Attacks Made in Collusion with an Insider","authors":"S. Russell","doi":"10.1007/BFb0032368","DOIUrl":"https://doi.org/10.1007/BFb0032368","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Access with Pseudonyms 使用假名访问
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032362
Lidong Chen
{"title":"Access with Pseudonyms","authors":"Lidong Chen","doi":"10.1007/BFb0032362","DOIUrl":"https://doi.org/10.1007/BFb0032362","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133183603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 101
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信