-
1
-
-
0038638945
-
Hardware architectures for public key cryptography
-
L. Batina, S. B. Örs, B. Preneel, and J. Vandewalle. Hardware architectures for public key cryptography. Integration, the VLSI Journal. 34(1-2):1-64, 2003.
-
(2003)
Integration, the VLSI Journal
, vol.34
, Issue.1-2
, pp. 1-64
-
-
Batina, L.1
Örs, S.B.2
Preneel, B.3
Vandewalle, J.4
-
3
-
-
0036340335
-
Secure exchange of information by synchronization of neural networks
-
I. Kanter, W. Kinzel, and E. Kanter. Secure exchange of information by synchronization of neural networks. Europhysics Letters, 57(1):141-147, 2002.
-
(2002)
Europhysics Letters
, vol.57
, Issue.1
, pp. 141-147
-
-
Kanter, I.1
Kinzel, W.2
Kanter, E.3
-
4
-
-
42749100878
-
Cooperating attackers in neural cryptography
-
(066137)
-
I. Kanter, W. Kinzel, L. Shacham, E. Klein, and R. Mislovaty. Cooperating attackers in neural cryptography. Phys Rev. E, 69(066137), 2004.
-
(2004)
Phys Rev. E
, vol.69
-
-
Kanter, I.1
Kinzel, W.2
Shacham, L.3
Klein, E.4
Mislovaty, R.5
-
5
-
-
84891304223
-
Analysis of neural cryptography
-
Proc. of AsiaCrypt 2002, Queenstown, New Zealand, December 1-5. Springer Verlag
-
A. Klimov, A. Mityagin, and A. Shamir. Analysis of neural cryptography. In Proc. of AsiaCrypt 2002, volume 2501 of LNCS. pages 288-298, Queenstown, New Zealand, December 1-5 2002. Springer Verlag.
-
(2002)
LNCS
, vol.2501
, pp. 288-298
-
-
Klimov, A.1
Mityagin, A.2
Shamir, A.3
-
6
-
-
0027599802
-
Secret key agreement by public discussion
-
U. Maurer. Secret key agreement by public discussion. IEEE Transactions on Information Theory. 39(3):733-742, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
8
-
-
41349083924
-
Secure key-exchange protocol with an absence of injective functions
-
(066102)
-
R. Mislovaty, Y. Perchenok, I. Kanter, and W. Kinzel. Secure key-exchange protocol with an absence of injective functions. Phys. Rev. E. 66(066102), 2002.
-
(2002)
Phys. Rev. E.
, vol.66
-
-
Mislovaty, R.1
Perchenok, Y.2
Kanter, I.3
Kinzel, W.4
-
9
-
-
33749056477
-
Past and future of cryptographic engineering
-
Stanford University. USA. August 22
-
C. Paar. Past and future of cryptographic engineering. Tutorial at HOT CHIPS 2003. Stanford University. USA. August 22 2003.
-
(2003)
Tutorial at HOT CHIPS 2003
-
-
Paar, C.1
-
10
-
-
37649031336
-
Mutual learning in a tree parity machine and its application to cryptography
-
(066135)
-
M. Rosen-Zvi, E. Klein, I. Kanter, and W. Kinzel. Mutual learning in a tree parity machine and its application to cryptography. Phys. Rev. E., 66(066135), 2002.
-
(2002)
Phys. Rev. E.
, vol.66
-
-
Rosen-Zvi, M.1
Klein, E.2
Kanter, I.3
Kinzel, W.4
-
11
-
-
33749076557
-
Security in pervasive computing
-
Proc. of the 1st International Conference on Security in Pervasive Computing (SPC 2003). Springer Verlag.
-
F. Stajano. Security in pervasive computing. In Proc. of the 1st International Conference on Security in Pervasive Computing (SPC 2003), volume 2802 of LNCS. page 1. Springer Verlag. 2003.
-
(2003)
LNCS
, vol.2802
, pp. 1
-
-
Stajano, F.1
-
12
-
-
17644426326
-
Tree parity machine rekeying architectures
-
Apr.
-
M. Volkmer and S. Wallner. Tree parity machine rekeying architectures. IEEE Transactions on Computers, 54(4):421-427, Apr. 2005.
-
(2005)
IEEE Transactions on Computers
, vol.54
, Issue.4
, pp. 421-427
-
-
Volkmer, M.1
Wallner, S.2
|