{"title":"Keyed Hash Functions","authors":"S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk","doi":"10.1007/BFb0032359","DOIUrl":"https://doi.org/10.1007/BFb0032359","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123952282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A One-Key Cryptosystem Based on a Finite Nonlinear Automaton","authors":"M. Gysin","doi":"10.1007/BFb0032356","DOIUrl":"https://doi.org/10.1007/BFb0032356","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123168147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation","authors":"Shin-Jia Hwang, Chinchen Chang, Wei-Pang Yang","doi":"10.1007/BFb0032360","DOIUrl":"https://doi.org/10.1007/BFb0032360","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"41 39","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133390316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Golic, M. Salmasizadeh, A. Clark, A. Khodkar, E. Dawson
{"title":"Discrete Optimisation and Fast Correlation Attacks","authors":"J. Golic, M. Salmasizadeh, A. Clark, A. Khodkar, E. Dawson","doi":"10.1007/BFb0032358","DOIUrl":"https://doi.org/10.1007/BFb0032358","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124640201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crypto in Europe - Markets, Law and Policy","authors":"Ross J. Anderson","doi":"10.1007/BFb0032347","DOIUrl":"https://doi.org/10.1007/BFb0032347","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116235764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Foiling Active Network Impersonisation Attacks Made in Collusion with an Insider","authors":"S. Russell","doi":"10.1007/BFb0032368","DOIUrl":"https://doi.org/10.1007/BFb0032368","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Access with Pseudonyms","authors":"Lidong Chen","doi":"10.1007/BFb0032362","DOIUrl":"https://doi.org/10.1007/BFb0032362","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133183603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}