Login / Signup
Cryptography: Policy and Algorithms
1995
1995
1995
Keyphrases
Publications
1995
Steve Orlowski
Encryption and the Gloval Information Infrastructure: An Australian Perspective.
Cryptography: Policy and Algorithms
(1995)
William Millan
Low Order Approximation of Cipher Functions.
Cryptography: Policy and Algorithms
(1995)
Lidong Chen
Access with Pseudonyms.
Cryptography: Policy and Algorithms
(1995)
Mark Ames
Saving Dollars Makes Sense of Crypto Export Controls.
Cryptography: Policy and Algorithms
(1995)
He Jingmin
,
Ed Dawson
How to Fairly Reconstruct a Shared Secret.
Cryptography: Policy and Algorithms
(1995)
William J. Caelli
Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement?
Cryptography: Policy and Algorithms
(1995)
Ross J. Anderson
Crypto in Europe - Markets, Law and Policy.
Cryptography: Policy and Algorithms
(1995)
Jovan Dj. Golic
,
Mahmoud Salmasizadeh
,
Andrew J. Clark
,
Abdollah Khodkar
,
Ed Dawson
Discrete Optimisation and Fast Correlation Attacks.
Cryptography: Policy and Algorithms
(1995)
Andreas Fuchsberger
,
Dieter Gollmann
,
Paul J. G. Lothian
,
Kenneth G. Paterson
,
Abraham Sidiropoulos
Public-key Cryptography on Smart Cards.
Cryptography: Policy and Algorithms
(1995)
Willis H. Ware
Privacy and Security Policy Choices in an NII Environment.
Cryptography: Policy and Algorithms
(1995)
Kefei Chen
A New Identification Algorithm.
Cryptography: Policy and Algorithms
(1995)
Shahram Bakhtiari
,
Reihaneh Safavi-Naini
,
Josef Pieprzyk
Keyed Hash Functions.
Cryptography: Policy and Algorithms
(1995)
George M. Mohay
,
Hasmukh Morarji
,
Q. Le Viet
,
Lance Munday
,
William J. Caelli
The CASS Shell.
Cryptography: Policy and Algorithms
(1995)
Nigel Jefferies
,
Chris J. Mitchell
,
Michael Walker
A Proposed Architecture for Trusted Third Party Services.
Cryptography: Policy and Algorithms
(1995)
Chi-Sung Laih
,
Wen-Chung Kuo
Cryptanalysis of the Enhanced ElGamal's Signature Scheme.
Cryptography: Policy and Algorithms
(1995)
Dieter Gollmann
Cryptographic APIs.
Cryptography: Policy and Algorithms
(1995)
Jovan Dj. Golic
A Note on Nonuniform Decimation of Periodic Sequences.
Cryptography: Policy and Algorithms
(1995)
Ivan Damgård
,
Lars R. Knudsen
Multiple Encryption with Minimum Key.
Cryptography: Policy and Algorithms
(1995)
Selwyn Russell
Foiling Active Network Impersonisation Attacks Made in Collusion with an Insider.
Cryptography: Policy and Algorithms
(1995)
William J. Caelli
Commercial Key Escrow: An Australian Perspective.
Cryptography: Policy and Algorithms
(1995)
Marc Gysin
A One-Key Cryptosystem Based on a Finite Nonlinear Automaton.
Cryptography: Policy and Algorithms
(1995)
Gary Gaskell
,
Mark Looi
Integrating Smart Cards Into Authentication Systems.
Cryptography: Policy and Algorithms
(1995)
Jovan Dj. Golic
,
Luke O'Connor
A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps.
Cryptography: Policy and Algorithms
(1995)
Jaroslav Hruby
Smart Card with Interferometric Quantum Cryptography Device.
Cryptography: Policy and Algorithms
(1995)
Shin-Jia Hwang
,
Chin-Chen Chang
,
Wei-Pang Yang
Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation.
Cryptography: Policy and Algorithms
(1995)
He Jingmin
,
Ed Dawson
A New Key Escrow Cryptosystem.
Cryptography: Policy and Algorithms
(1995)
Helen Gustafson
,
Ed Dawson
,
Jovan Dj. Golic
Randomness Measures Related to Subset Occurrence.
Cryptography: Policy and Algorithms
(1995)
volume 1029, 1995
Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings
Cryptography: Policy and Algorithms
1029 (1995)