-
1
-
-
0035245921
-
Fast encryption for multimedia
-
Feb.
-
X. Yi, C.H. Tan, C.K. Siew and M.R. Syed, "Fast encryption for multimedia", IEEE Trans. on Consumer Electronics, vol. 47, pp. 101-107, Feb. (2001).
-
(2001)
IEEE Trans. on Consumer Electronics
, vol.47
, pp. 101-107
-
-
Yi, X.1
Tan, C.H.2
Siew, C.K.3
Syed, M.R.4
-
2
-
-
0036564138
-
ID-based key agreement for multimedia encryption
-
May
-
X. Yi, C.H. Tan, C.K. Siew and M.R. Syed, "ID-based key agreement for multimedia encryption", IEEE Trans. on Consumer Electronics, vol. 48, pp. 298-303, May (2002).
-
(2002)
IEEE Trans. on Consumer Electronics
, vol.48
, pp. 298-303
-
-
Yi, X.1
Tan, C.H.2
Siew, C.K.3
Syed, M.R.4
-
3
-
-
0035248161
-
Cryptanalysis of a public-key cryptosystem based on generalized inverses matrices
-
Feb.
-
M.M. Sun, "Cryptanalysis of a public-key cryptosystem based on generalized inverses matrices", IEEE Comm. Lett., vol. 5 p. 61-63, Feb. Feb. 2001.
-
(2001)
IEEE Comm. Lett.
, vol.5
, pp. 61-63
-
-
Sun, M.M.1
-
5
-
-
84890522850
-
Communication theory of secret systems
-
C.E. Shannon, "Communication theory of secret systems", Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
6
-
-
0024012644
-
An introduction to contemporary cryptology
-
May
-
J. L. Massey, "An introduction to contemporary cryptology", Proceedings of the IEEE vol. 76, pp. 534-549, May 1988.
-
(1988)
Proceedings of the IEEE
, vol.76
, pp. 534-549
-
-
Massey, J.L.1
-
8
-
-
84948963512
-
Improved fast correlation attacks using parity-check equations of weight 4 and 5
-
A. Canteaut and M. Trabbia, "Improved fast correlation attacks using parity-check equations of weight 4 and 5", Advances in Cryptology - EUROCRYPT2000, Lecture Notes in Computer Science, vol. 1807, pp. 573-588, 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT2000, Lecture Notes in Computer Science
, vol.1807
, pp. 573-588
-
-
Canteaut, A.1
Trabbia, M.2
-
9
-
-
84969367308
-
A simple algorithm for fast correlation attacks on stream ciphers
-
V.V. Chepyzhov, T. Johansson and B. Smeets, "A simple algorithm for fast correlation attacks on stream ciphers", Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 180-195, 2001.
-
(2001)
Fast Software Encryption 2000, Lecture Notes in Computer Science
, vol.1978
, pp. 180-195
-
-
Chepyzhov, V.V.1
Johansson, T.2
Smeets, B.3
-
10
-
-
84974625340
-
Fast correlation attacks through reconstruction of linear polynomials
-
T. Johasson and F. Jonsson, "Fast correlation attacks through reconstruction of linear polynomials", Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880, pp. 300-315, 2000.
-
(2000)
Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science
, vol.1880
, pp. 300-315
-
-
Johasson, T.1
Jonsson, F.2
-
11
-
-
84974727960
-
A low-complexity and high-performance algorithm for the fast correlation attack
-
M.J. Mihaljevic, M.P.C. Fossorier and H. Imai, "A low-complexity and high-performance algorithm for the fast correlation attack", Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 1962-212, 2001.
-
(2001)
Fast Software Encryption 2000, Lecture Notes in Computer Science
, vol.1978
, pp. 196-212
-
-
Mihaljevic, M.J.1
Fossorier, M.P.C.2
Imai, H.3
-
12
-
-
0035311895
-
On decoding techniques for cryptanalysis of certain encryption algorithms
-
April
-
M.J. Mihaljevic, M.P.C. Fossorier and H. Imai, "On decoding techniques for cryptanalysis of certain encryption algorithms", IEICE Trans. Fundamentals, E84-A, pp. 919-930, April 2001.
-
(2001)
IEICE Trans. Fundamentals
, vol.E84-A
, pp. 919-930
-
-
Mihaljevic, M.J.1
Fossorier, M.P.C.2
Imai, H.3
-
13
-
-
0034269942
-
A method for convergence analysis of iterative probabilistic decoding
-
Sept.
-
M.J. Mihaljevic and J.Dj. Golic, "A method for convergence analysis of iterative probabilistic decoding", IEEE Trans. Inform. Theory, vol. 46, 2206-2211, Sept. 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 2206-2211
-
-
Mihaljevic, M.J.1
Golic, J.Dj.2
-
14
-
-
84958981368
-
Fast correlation attack algorithm with the list decoding and an application
-
M.K. Mihaljevic, M.P.C. Fossorier and H. Imai, "Fast correlation attack algorithm with the list decoding and an application", Fast Software Encryption - FSE2001, Lecture Notes in Computer Science, vol. 2355, pp. 196-210, 2002.
-
(2002)
Fast Software Encryption - FSE2001, Lecture Notes in Computer Science
, vol.2355
, pp. 196-210
-
-
Mihaljevic, M.K.1
Fossorier, M.P.C.2
Imai, H.3
-
15
-
-
0009792703
-
On wireless communications privacy and security evaluation of encryption techniques
-
M.J. Mihaljevi and R. Kohno, "On wireless communications privacy and security evaluation of encryption techniques", IEEE Wireless Communications and Networking Conf. - WCNC2002, Orlando, FL, USA, March 2002, Proceedings, pp. 865-868.
-
IEEE Wireless Communications and Networking Conf. - WCNC2002, Orlando, FL, USA, March 2002, Proceedings
, pp. 865-868
-
-
Mihaljevi, M.J.1
Kohno, R.2
-
16
-
-
0036748614
-
Cryptanalysis of fast encryption algorithm for multimedia FEA-M
-
Sept.
-
M.J. Mihaljevic and R. Kohno, "Cryptanalysis of fast encryption algorithm for multimedia FEA-M", IEEE Comm. Letters, vol. 6, pp. 382-384, Sept. 2002.
-
(2002)
IEEE Comm. Letters
, vol.6
, pp. 382-384
-
-
Mihaljevic, M.J.1
Kohno, R.2
-
17
-
-
21144456505
-
Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(q)
-
Feb.
-
P. Camion, M.J. Mihaljevic anad H. Imai, "Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(q)", Selected Areas in Cryptography - SAC2002, Lecture Notes in Computer Science, vol. 2595, pp. 196-213, Feb. 2003.
-
(2003)
Selected Areas in Cryptography - SAC2002, Lecture Notes in Computer Science
, vol.2595
, pp. 196-213
-
-
Camion, P.1
Mihaljevic, M.J.H.2
Imai3
-
18
-
-
1542520946
-
CRYPTREC Report 2001
-
Information Technology Promotion Agency (IPA), Japan, Oct.
-
"CRYPTREC Report 2001", Information Technology Promotion Agency (IPA), Japan, Oct. 2002. http://www.ipa.go.jp/security/index-e.html
-
(2002)
-
-
-
19
-
-
1542730850
-
NESSIE Security Report, Version 2.0 First
-
NESSIE Org.Tech. Report, March
-
"NESSIE Security Report, Version 2.0 First", NESSIE Org.Tech. Report, March 2002, http://www.cryptonessie.org
-
(2002)
-
-
-
20
-
-
0032677326
-
End-to-end internet packet dynamics
-
V. Paxson, "End-to-end Internet packet dynamics", IEEE/ACM Transactions on Networking, vol. 7, pp. 277-292, 1999.
-
(1999)
IEEE/ACM Transactions on Networking
, vol.7
, pp. 277-292
-
-
Paxson, V.1
|