-
1
-
-
84976829824
-
-
Special section on encryption standards and the proposed digital signature standard. (July)
-
Commun. ACM. Special section on encryption standards and the proposed digital signature standard. (July 1992), 32-54.
-
(1992)
Commun. ACM.
, pp. 32-54
-
-
-
2
-
-
84976722218
-
-
186. Digital signature standard (DSS). May
-
Federal Information Processing Standard (FIPS) 186. Digital signature standard (DSS). May 1994.
-
(1994)
-
-
-
3
-
-
0026652177
-
A cubic residue code equivalent to factorization
-
Loxton, J., Khoo, D.S.P., Bird, G.J., and Seberry, J. A cubic residue code equivalent to factorization. J Cryptol 5 (1992), 139-150.
-
(1992)
J Cryptol
, vol.5
, pp. 139-150
-
-
Loxton, J.1
Khoo, D.S.P.2
Bird, G.J.3
Seberry, J.4
-
4
-
-
84976812255
-
Contemporary cryptology: An introduction
-
G.J. Simmons, Ed. IEEE Press, New York, pp. 3-39; also in Proceedings of the IEEE 76, 5 (May), 1991
-
Massey, J.L. Contemporary cryptology: An introduction. In Contemporary Cryptology: The Science of Information Integrity, G.J. Simmons, Ed. IEEE Press, New York, 1991, pp. 3-39; also in Proceedings of the IEEE 76, 5 (May 1988), 533-549.
-
(1988)
Contemporary Cryptology: The Science of Information Integrity
, pp. 533-549
-
-
Massey, J.L.1
-
6
-
-
0024014116
-
-
also in, (May)
-
also in Proceedings of the IEEE 76, 5 (May 1988), 594-602.
-
(1988)
Proceedings of the IEEE
, vol.76
, Issue.5
, pp. 594-602
-
-
-
7
-
-
1642535141
-
The subliminal channels in the U.S. digital signature algorithm (DSA)
-
(Rome, Italy, Feb. 15-16). W. Wolfowicz, Ed. Fondazione Ugo Bordoni, Rome
-
Simmons, G.J. The subliminal channels in the U.S. digital signature algorithm (DSA). In Proceedings of the 3rd Symposium on Stale and Progress of Research in Cryptography (Rome, Italy, Feb. 15-16). W. Wolfowicz, Ed. Fondazione Ugo Bordoni, Rome, 1993, pp. 35-54.
-
(1993)
Proceedings of the 3rd Symposium on Stale and Progress of Research in Cryptography
, pp. 35-54
-
-
Simmons, G.J.1
-
8
-
-
84978194862
-
Subliminal communication is possible using the DSA
-
Tor Helleseth Ed. (Lofthus, Norway, May 23-27, 1993), Springer-Verlag, Berlin
-
Simmons, G.J. Subliminal communication is possible using the DSA. In Lecture Notes in Computer Science 765: Advances in Cryptology: Proceedings Eurocrypt '93. Tor Helleseth Ed. (Lofthus, Norway, May 23-27, 1993), Springer-Verlag, Berlin, 1994, pp. 218-232.
-
(1994)
Lecture Notes in Computer Science 765: Advances in Cryptology: Proceedings Eurocrypt '93
, pp. 218-232
-
-
Simmons, G.J.1
-
9
-
-
3142696449
-
An introduction to the mathematics of trust in security protocols
-
(Franconia, N.H., June 15-17). IEEE Computer Society Press, Los Alamitos, Calif.
-
Simmons, G.J. An introduction to the mathematics of trust in security protocols. In Proceedings: Computer Security Foundations Workshop VI (Franconia, N.H., June 15-17). IEEE Computer Society Press, Los Alamitos, Calif., 1993, pp. 121-127.
-
(1993)
Proceedings: Computer Security Foundations Workshop VI
, pp. 121-127
-
-
Simmons, G.J.1
-
11
-
-
84969340391
-
Key distribution protocol for digital mobile communication systems
-
G. Brassard, Ed. (Santa Barbara, Calif., Aug. 2-24). Springer-Verlag, Berlin
-
Tatebayashi, M., Matsuzaki, N., and Newman, D.B. Key distribution protocol for digital mobile communication systems. In Lecture Notes in Computer Science 435: Advances in Cryptology: Proceedings of Crypto '89 G. Brassard, Ed. (Santa Barbara, Calif., Aug. 2-24). Springer-Verlag, Berlin, 1990, pp. 324-333.
-
(1990)
Lecture Notes in Computer Science 435: Advances in Cryptology: Proceedings of Crypto '89
, pp. 324-333
-
-
Tatebayashi, M.1
Matsuzaki, N.2
Newman, D.B.3
-
12
-
-
84946834918
-
3 public-key encryption scheine
-
H.C. Williams, Ed. (Santa Barbara, Calif., Aug. 18-22, 1985). Springer-Verlag, Berlin
-
3 public-key encryption scheine. In Lecture Notes in Computer Science 218; Advances in Cryptology: Proceedings of Crypto '85, H.C. Williams, Ed. (Santa Barbara, Calif., Aug. 18-22, 1985). Springer-Verlag, Berlin, 1986, pp. 358-368.
-
(1986)
Lecture Notes in Computer Science 218; Advances in Cryptology: Proceedings of Crypto '85
, pp. 358-368
-
-
Williams, H.C.1
|