-
2
-
-
17644409195
-
"Eingebettete Sicherheit im Automobil. ESCAR - Embedded IT-Security in Cars, Cologne, Germany"
-
18-19 Nov
-
C. Paar, "Eingebettete Sicherheit im Automobil. ESCAR - Embedded IT-Security in Cars, Cologne, Germany," 18-19 Nov. 2003.
-
(2003)
-
-
Paar, C.1
-
3
-
-
17644412145
-
"Smart Card Security"
-
B. Preneel and V. Rijmen, eds., Springer Verlag, June
-
E. Bovelander, "Smart Card Security," State of the Art in Applied Cryptography - Course on Computer Security and Industrial Cryptography (Revised Lectures), B. Preneel and V. Rijmen, eds., Springer Verlag, June 1997.
-
(1997)
State of the Art in Applied Cryptography - Course on Computer Security and Industrial Cryptography (Revised Lectures)
-
-
Bovelander, E.1
-
4
-
-
84979054516
-
"Smart Cards - Requirements, Properties, and Applications"
-
Springer Verlag, June
-
K. Vedder and F. Weikmann, "Smart Cards - Requirements, Properties, and Applications," State of the Art in Applied Cryptography - Course on Computer Security and Industrial Cryptography (Revised Lectures), pp. 307-331, Springer Verlag, June 1997.
-
(1997)
State of the Art in Applied Cryptography - Course on Computer Security and Industrial Cryptography (Revised Lectures)
, pp. 307-331
-
-
Vedder, K.1
Weikmann, F.2
-
5
-
-
17644368369
-
"Cryptography in Embedded Systems: An Overview (Invited Paper)"
-
Feb
-
T. Wollinger, J. Guajardo, and C. Paar, "Cryptography in Embedded Systems: An Overview (Invited Paper)," Proc. Embedded World 2003 Exhibition and Conf., pp. 735-744, Feb. 2003.
-
(2003)
Proc. Embedded World 2003 Exhibition and Conf.
, pp. 735-744
-
-
Wollinger, T.1
Guajardo, J.2
Paar, C.3
-
7
-
-
0003185688
-
"La Cryptographie Militaire"
-
pp. 5-38, Jan. 1883, Feb
-
A. Kerckhoffs, "La Cryptographie Militaire," J. des Sciences Militaries, vol. IX, pp. 5-38, Jan. 1883, pp. 161-191, Feb. 1883.
-
(1883)
J. Des Sciences Militaries
, vol.9
, pp. 161-191
-
-
Kerckhoffs, A.1
-
9
-
-
0017018484
-
"New Directions in Cryptography"
-
Nov
-
W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
10
-
-
84874800178
-
"A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms"
-
T.E. Gamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory, vol. 31, no. 4, pp. 469-472, 1985.
-
(1985)
IEEE Trans. Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Gamal, T.E.1
-
11
-
-
0017930809
-
"A Method for Obtaining Digital Signatures and Public Key Cryptosystems"
-
Feb
-
R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
12
-
-
17644364204
-
-
TopSec GSM, Data Sheet PD0757.6904.21, Rhode & Schwarz, Aug
-
Rhode & Schwarz, TopSec GSM, Data Sheet PD0757.6904.21, Aug. 2001.
-
(2001)
-
-
-
14
-
-
0036340335
-
"Secure Exchange of Information by Synchronization of Neural Networks"
-
I. Kanter, W. Kinzel, and E. Kanter, "Secure Exchange of Information by Synchronization of Neural Networks," Europhysics Letters, vol. 57, no. 1, pp. 141-147, 2002.
-
(2002)
Europhysics Letters
, vol.57
, Issue.1
, pp. 141-147
-
-
Kanter, I.1
Kinzel, W.2
Kanter, E.3
-
15
-
-
0034238005
-
"Interacting Neural Networks"
-
R. Metzler, W. Kinzel, and I. Kanter, "Interacting Neural Networks," Physics Rev. E, vol. 62, no. 2, pp. 2555-2565, 2000.
-
(2000)
Physics Rev. E
, vol.62
, Issue.2
, pp. 2555-2565
-
-
Metzler, R.1
Kinzel, W.2
Kanter, I.3
-
16
-
-
0142021471
-
"Interacting Neural Networks and Cryptography"
-
B. Kramer, ed., Springer Verlag
-
W. Kinzel and I. Kanter, "Interacting Neural Networks and Cryptography," Advances in Solid State Physics, B. Kramer, ed., Springer Verlag, 2002.
-
(2002)
Advances in Solid State Physics
-
-
Kinzel, W.1
Kanter, I.2
-
17
-
-
17644425110
-
"Theory of Interacting Neural Networks"
-
S. Bornholdt and H. Schuster, eds., Wiley VCH
-
"Theory of Interacting Neural Networks," Handbook of Graphs and Networks, S. Bornholdt and H. Schuster, eds., Wiley VCH, 2003.
-
(2003)
Handbook of Graphs and Networks
-
-
-
18
-
-
0027599802
-
"Secret Key Agreement by Public Discussion"
-
U. Maurer, "Secret Key Agreement by Public Discussion," IEEE Trans. Information Theory, vol. 39, no. 3, pp. 733-742, 1993.
-
(1993)
IEEE Trans. Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
19
-
-
84891304223
-
"Analysis of Neural Cryptography"
-
A. Klimov, A. Mityagin, and A. Shamir, "Analysis of Neural Cryptography," Proc. AsiaCrypt 2002, pp. 288-298, 2002.
-
(2002)
Proc. AsiaCrypt 2002
, pp. 288-298
-
-
Klimov, A.1
Mityagin, A.2
Shamir, A.3
-
20
-
-
41349083924
-
"Secure Key-Exchange Protocol with an Absence of Injective Functions"
-
066102
-
R. Mislovaty, Y. Perchenok, I. Kanter, and W. Kinzel, "Secure Key-Exchange Protocol with an Absence of Injective Functions," Physics Rev. E, vol. 66, no. 066102, 2002.
-
(2002)
Physics Rev. E
, vol.66
-
-
Mislovaty, R.1
Perchenok, Y.2
Kanter, I.3
Kinzel, W.4
-
21
-
-
37649031336
-
"Mutual Learning in a Tree Parity Machine and Its Application to Cryptography"
-
066135
-
M. Rosen-Zvi, E. Klein, I. Kanter, and W. Kinzel, "Mutual Learning in a Tree Parity Machine and Its Application to Cryptography," Physics Rev. E., vol. 66, no. 066135, 2002.
-
(2002)
Physics Rev. E.
, vol.66
-
-
Rosen-Zvi, M.1
Klein, E.2
Kanter, I.3
Kinzel, W.4
-
23
-
-
17644369423
-
"Cooperating Attackers in Neural Cryptography"
-
Dec. preprint www.arxiv.org/cond-mat/0312068
-
L.N. Shacham, E. Klein, R. Mislovaty, I. Kanter, and W. Kinzel, "Cooperating Attackers in Neural Cryptography," Dec. 2003, preprint www.arxiv.org/cond-mat/0312068.
-
(2003)
-
-
Shacham, L.N.1
Klein, E.2
Mislovaty, R.3
Kanter, I.4
Kinzel, W.5
-
24
-
-
12444293717
-
"Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Rekeying Techniques"
-
T. Okamoto, ed
-
M. Abdalla and M. Bellare, "Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Rekeying Techniques," Advances in Cryptology - Asiacrypt 2000 Proc., T. Okamoto, ed., 2000.
-
(2000)
Advances in Cryptology - Asiacrypt 2000 Proc.
-
-
Abdalla, M.1
Bellare, M.2
-
26
-
-
0037195738
-
"Cryptography Based on Neural Networks - Analytical Results"
-
M. Rosen-Zvi, I. Kanter, and W. Kinzel, "Cryptography Based on Neural Networks - Analytical Results," J. Physics A: Math. Gen., vol. 35, no. 47, pp. L707-L713, 2002.
-
(2002)
J. Physics A: Math. Gen.
, vol.35
, Issue.47
-
-
Rosen-Zvi, M.1
Kanter, I.2
Kinzel, W.3
-
27
-
-
17644424111
-
"Repulsive Feedback Mechanisms in Neural Cryptography"
-
A. Ruttor and W. Kinzel, "Repulsive Feedback Mechanisms in Neural Cryptography," 2003.
-
(2003)
-
-
Ruttor, A.1
Kinzel, W.2
-
28
-
-
0142120725
-
"Public Channel Cryptography by Synchronization of Neural Networks and Chaotic Maps"
-
118701
-
R. Mislovaty, E. Klein, I. Kanter, and W. Kinzel, "Public Channel Cryptography by Synchronization of Neural Networks and Chaotic Maps," Physics Rev. Letters, vol. 91, no. 118701, 2003.
-
(2003)
Physics Rev. Letters
, vol.91
-
-
Mislovaty, R.1
Klein, E.2
Kanter, I.3
Kinzel, W.4
-
29
-
-
42749101363
-
"Neural Cryptography with Feedback"
-
A. Ruttor, W. Kinzel, L. Shacham, and I. Kanter, "Neural Cryptography with Feedback," Physics Rev. E, vol. 69, 2004.
-
(2004)
Physics Rev. E
, vol.69
-
-
Ruttor, A.1
Kinzel, W.2
Shacham, L.3
Kanter, I.4
|