-
1
-
-
0027252291
-
Private-key burst correcting code encryption
-
F.M.R. Alencar, A.M.P. Léo, R.M. Campello de Souza, Private-key burst correcting code encryption, in: Proceedings of the 1993 IEEE International Symposium on Information Theory, 1993, p. 227.
-
(1993)
Proceedings of the 1993 IEEE International Symposium on Information Theory
, pp. 227
-
-
Alencar, F.M.R.1
Léo, A.M.P.2
Campello de Souza, R.M.3
-
2
-
-
0030287972
-
Security of private-key encryption based on array codes
-
Al Jabri A. Security of private-key encryption based on array codes. Electronics Letters. 32(24):1996;2226-2227.
-
(1996)
Electronics Letters
, vol.32
, Issue.24
, pp. 2226-2227
-
-
Al Jabri, A.1
-
5
-
-
84958666890
-
Failure of the McEliece public-key cryptosystem under message-resend and related-message attack
-
Berlin: Springer
-
Berson T.A. Failure of the McEliece public-key cryptosystem under message-resend and related-message attack. Advances in Cryptology - CRYPTO'97. 1997;213-220 Springer, Berlin.
-
(1997)
Advances in Cryptology - CRYPTO'97
, pp. 213-220
-
-
Berson, T.A.1
-
6
-
-
0012845534
-
Public key protocols for wireless communications
-
C. Boyd, D.-G. Park, Public key protocols for wireless communications, in: Proceedings of the ICISC, 1998, pp. 47-57.
-
(1998)
Proceedings of the ICISC
, pp. 47-57
-
-
Boyd, C.1
Park, D.-G.2
-
10
-
-
0025508369
-
Network Security via private-key certificates
-
Davis D., Swick R. Network Security via private-key certificates. Operating Systems Review. 24:1990;64-67.
-
(1990)
Operating Systems Review
, vol.24
, pp. 64-67
-
-
Davis, D.1
Swick, R.2
-
12
-
-
0345977489
-
-
Gemplus. Available from < www.gemplus.com>.
-
-
-
-
13
-
-
84937740421
-
Shift register synthesis and BCH decoding
-
Massey J.L. Shift register synthesis and BCH decoding. IEEE Transactions on Information Theory. 15(1):1969;122-127.
-
(1969)
IEEE Transactions on Information Theory
, vol.15
, Issue.1
, pp. 122-127
-
-
Massey, J.L.1
-
14
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
Jet Propulsion Lab., CA, January and February
-
R.J. McEliece, A public-key cryptosystem based on algebraic coding theory, DSN Progress Report, Jet Propulsion Lab., CA, January and February 1978, pp. 42-44.
-
(1978)
DSN Progress Report
, pp. 42-44
-
-
McEliece, R.J.1
-
15
-
-
0028397595
-
An authentication protocol for mobile users
-
Molva R., Samfat D., Tsudik G. An authentication protocol for mobile users. IEEE Networks. 8(2):1994;26-34.
-
(1994)
IEEE Networks
, vol.8
, Issue.2
, pp. 26-34
-
-
Molva, R.1
Samfat, D.2
Tsudik, G.3
-
16
-
-
0024752648
-
Improving code rate of McEliece public-key cryptosystem
-
Park C.-S. Improving code rate of McEliece public-key cryptosystem. Electronics Letters. 25(21):1989;1466-1467.
-
(1989)
Electronics Letters
, vol.25
, Issue.21
, pp. 1466-1467
-
-
Park, C.-S.1
-
17
-
-
0031234695
-
On certificate-based security protocols for the wireless mobile communication systems
-
Park C.-S. On certificate-based security protocols for the wireless mobile communication systems. IEEE Networks. 11(9):1997;50-55.
-
(1997)
IEEE Networks
, vol.11
, Issue.9
, pp. 50-55
-
-
Park, C.-S.1
-
19
-
-
0346608757
-
A method providing identity privacy to mobile users during authentication
-
Santa Cruz, CA, December 8-9
-
D. Samfat, R. Molva, A method providing identity privacy to mobile users during authentication, in: IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, December 8-9, 1994.
-
(1994)
IEEE Workshop on Mobile Computing Systems and Applications
-
-
Samfat, D.1
Molva, R.2
-
20
-
-
84956862729
-
The Rao-Nam scheme is insecure against a chosen-plaintext attack
-
Berlin: Springer
-
Struik R., Tilburg J. The Rao-Nam scheme is insecure against a chosen-plaintext attack. Advances in Cryptology - CRYPTO'87. 1988;445-457 Springer, Berlin.
-
(1988)
Advances in Cryptology - CRYPTO'87
, pp. 445-457
-
-
Struik, R.1
Tilburg, J.2
-
22
-
-
0347238445
-
On private-key cryptosystem based on product codes, information security and privacy
-
Proceedings of the Third Australasian Conference, ACISP'98 Brisbane, Australia, Berlin: Springer
-
Sun H.M., Shieh S.P. On private-key cryptosystem based on product codes, information security and privacy. Proceedings of the Third Australasian Conference, ACISP'98, Brisbane, Australia, Lecture Notes in Computer Science, vol. 1438. 1998;64-79 Springer, Berlin.
-
(1998)
Lecture Notes in Computer Science
, vol.1438
, pp. 64-79
-
-
Sun, H.M.1
Shieh, S.P.2
-
23
-
-
84948947592
-
On the security of 3GPP networks
-
Springer, Berlin
-
Walker M. On the security of 3GPP networks. Advances in Cryptology - Eurocrypt 2000. 2001;102-103 Springer, Berlin.
-
(2001)
Advances in Cryptology - Eurocrypt 2000
, pp. 102-103
-
-
Walker, M.1
|