Login / Signup
Cryptographic Algorithms and their Uses
2004
2004
2004
Keyphrases
Publications
2004
Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings
Cryptographic Algorithms and their Uses
(2004)
Yousef Bani Hammad
,
Gary Carter
,
Ed Dawson
,
Yvonne Hitchcock
Improvements to the RAK Factoring Algorithm.
Cryptographic Algorithms and their Uses
(2004)
Praveen Gauravaram
,
William Millan
,
Lauren May
CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique.
Cryptographic Algorithms and their Uses
(2004)
Kun Peng
,
Riza Aditya
,
Colin Boyd
,
Ed Dawson
,
Byoungcheon Lee
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate.
Cryptographic Algorithms and their Uses
(2004)
Hossein Ghodosi
,
Josef Pieprzyk
A Modification to the 'Authentication of Concast Communication'.
Cryptographic Algorithms and their Uses
(2004)
Mike Bond
,
Jolyon Clulow
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure).
Cryptographic Algorithms and their Uses
(2004)
Matthew Henricksen
,
Ming Yao
,
Ernest Foo
An Implementation of the Yao Forward Integrity Protocol for Mobile Agents.
Cryptographic Algorithms and their Uses
(2004)
Jaimee Brown
,
Ed Dawson
,
Juan Manuel González Nieto
Implementation of the GBD Cryptosystem.
Cryptographic Algorithms and their Uses
(2004)
Chris Wullems
,
Harikrishna Vasanta
,
Mark Looi
,
Andrew J. Clark
A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation.
Cryptographic Algorithms and their Uses
(2004)
Lan Nguyen
,
Reihaneh Safavi-Naini
An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System.
Cryptographic Algorithms and their Uses
(2004)
Christopher Wolf
Efficient Public Key Generation for HFE and Variations.
Cryptographic Algorithms and their Uses
(2004)
Praveen Gauravaram
,
William Millan
Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE).
Cryptographic Algorithms and their Uses
(2004)
Kevin Chen
,
William Millan
,
Leonie Ruth Simpson
Perspectives on Word Based Stream Ciphers.
Cryptographic Algorithms and their Uses
(2004)