-
1
-
-
84947957002
-
Information technology - open systems interconnection - security frameworks in open systems, part 4: Non-repudiation
-
ISO/IEC DIS 10181-4, 04-21
-
ISO/IEC DIS 10181-4. Information technology - open systems interconnection - security frameworks in open systems, part 4: Non-repudiation. ISO/IEC JTC1, 1995-04-21.
-
(1995)
ISO/IEC JTC1
-
-
-
2
-
-
84947957003
-
Information technology - security techniques - nonrepudiation - part 3: Using asymmetric techniques
-
ISO/IEC CD 13888-3, 09-21
-
ISO/IEC CD 13888-3. Information technology - security techniques - nonrepudiation - part 3: Using asymmetric techniques. ISO/IEC JTC1/SC27 N1107, 1995-09-21.
-
(1995)
ISO/IEC JTC1/SC27 N1107
-
-
-
3
-
-
0028532579
-
Why cryptosystems fail
-
Ross J. Anderson. Why cryptosystems fail. Communications of the ACM, 37, № 11:32-40, 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.11
, pp. 32-40
-
-
Anderson, R.J.1
-
4
-
-
85027967075
-
Past exponentiation with precomputation
-
Springer-Verlag, New York
-
E.F. Brickell, D.M. Gordon, K.S. McCurley, and D.B. Wilson. Past exponentiation with precomputation. In Advances in Cryptology: Proceedings of Eurocrypt '92, LNCS 658, pages 200-207. Springer-Verlag, New York, 1993.
-
(1993)
Advances in Cryptology: Proceedings of Eurocrypt '92, LNCS
, vol.658
, pp. 200-207
-
-
Brickell, E.F.1
Gordon, D.M.2
McCurley, K.S.3
Wilson, D.B.4
-
6
-
-
0029362450
-
Practical and provably secure release of a secret and exchange of signatures
-
Ivan Bjerre Damgård. Practical and provably secure release of a secret and exchange of signatures. J. of Cryptology, 8, № 4:201-222, 1995.
-
(1995)
J. of Cryptology
, vol.8
, Issue.4
, pp. 201-222
-
-
Damgård, I.B.1
-
7
-
-
0038800534
-
Redundant integer representations and fast exponentiation
-
D. Gollmann, Y. Han, and C.J. Mitchell. Redundant integer representations and fast exponentiation. Designs, Codes and Cryptography, 7:135-151, 1996.
-
(1996)
Designs, Codes and Cryptography
, vol.7
, pp. 135-151
-
-
Gollmann, D.1
Han, Y.2
Mitchell, C.J.3
-
8
-
-
84947919610
-
Parallel inference on systolic arrays and neural networks
-
Y. Han and D. J. Evans. Parallel inference on systolic arrays and neural networks. Parallel Algorithms and Application, 10, № 1&2:169-175, 1996.
-
(1996)
Parallel Algorithms and Application
, vol.10
, Issue.1-2
, pp. 169-175
-
-
Han, Y.1
Evans, D.J.2
-
9
-
-
84947940240
-
The simulation of EDC with OCCAM on multitransputer system
-
York, U. K, Simulation Councile
-
Y. Han and D.J. Evans. The simulation of EDC with OCCAM on multitransputer system. In Modelling and Simulation, pages 277-279, York, U. K., 1992. Simulation Councile.
-
(1992)
Modelling and Simulation
, pp. 277-279
-
-
Han, Y.1
Evans, D.J.2
-
10
-
-
0344800654
-
Parallel inference algorithms for the connection method on systolic arrays
-
Y. Han and D.J. Evans. Parallel inference algorithms for the connection method on systolic arrays. International Journal of Computer Mathematics, 53:177-188, 1994.
-
(1994)
International Journal of Computer Mathematics
, vol.53
, pp. 177-188
-
-
Han, Y.1
Evans, D.J.2
-
11
-
-
3242843604
-
Minimal fc-SR representations
-
Cirencester, U.K, Springer-Verlag, Berlin
-
Y. Han, D. Gollmann, and C.J. Mitchell. Minimal fc-SR representations. In Proceedings of fifth IMA Conference on Cryptography and Coding, LNCS 1025, pages 34-43, Cirencester, U.K, 1995. Springer-Verlag, Berlin.
-
(1995)
Proceedings of fifth IMA Conference on Cryptography and Coding, LNCS
, vol.1025
, pp. 34-43
-
-
Han, Y.1
Gollmann, D.2
Mitchell, C.J.3
-
13
-
-
84947928095
-
Fast Algorithms for Public Key Cryptography
-
University of London
-
Yongfei Han. Fast Algorithms for Public Key Cryptography. Ph.D. Thesis, University of London, 1995.
-
(1995)
Ph.D. Thesis
-
-
Han, Y.1
-
15
-
-
0000608701
-
Authentication codes for nontrusting parties obtained from rank metric codes
-
T. Johansson. Authentication codes for nontrusting parties obtained from rank metric codes. J. of Cryptology, 6:205-218, 1995.
-
(1995)
J. of Cryptology
, vol.6
, pp. 205-218
-
-
Johansson, T.1
-
16
-
-
84955368946
-
More flexible exponentiation with precomputation
-
Santa Barbara, Ca, Springer-Verlag, New York
-
C.H. Lim and P.J. Lee. More flexible exponentiation with precomputation. In Advances in Cryptology: Proceedings of CRYPTO '94, pages 95-105, Santa Barbara, Ca., 1994. Springer-Verlag, New York.
-
(1994)
Advances in Cryptology: Proceedings of CRYPTO '94
, pp. 95-105
-
-
Lim, C.H.1
Lee, P.J.2
-
17
-
-
0028532812
-
Denial of service
-
Roger M. Needham. Denial of service. Communication of the ACM, 37, № 11:42-46, 1994.
-
(1994)
Communication of the ACM
, vol.37
, Issue.11
, pp. 42-46
-
-
Needham, R.M.1
-
18
-
-
84867300668
-
How to simultaneously exchange secret by general assumptions
-
Fairfax, Virginia, November
-
T. Okamoto and K. Ohta. How to simultaneously exchange secret by general assumptions. In Proceedings of 1994 IEEE Symposium on Research in Security and Privacy, pages 14-28, Fairfax, Virginia, November, 1994.
-
(1994)
Proceedings of 1994 IEEE Symposium on Research in Security and Privacy
, pp. 14-28
-
-
Okamoto, T.1
Ohta, K.2
|