Found: 15
Select item for more details and to access through your institution.
Building Group Key Establishment on Group Theory: A Modular Approach.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 2, p. 197, doi. 10.3390/sym12020197
- By:
- Publication type:
- Article
Algebraic Properties of the Block Cipher DESL.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 11, p. 1411, doi. 10.3390/sym11111411
- By:
- Publication type:
- Article
Tuning a two-round group key agreement.
- Published in:
- International Journal of Information Security, 2014, v. 13, n. 5, p. 467, doi. 10.1007/s10207-013-0225-6
- By:
- Publication type:
- Article
Secure group key establishment revisited.
- Published in:
- International Journal of Information Security, 2007, v. 6, n. 4, p. 243, doi. 10.1007/s10207-007-0018-x
- By:
- Publication type:
- Article
Key substitution attacks revisited: Taking into account malicious signers.
- Published in:
- International Journal of Information Security, 2006, v. 5, n. 1, p. 30, doi. 10.1007/s10207-005-0071-2
- By:
- Publication type:
- Article
An attack on the isomorphisms of polynomials problem with one secret.
- Published in:
- International Journal of Information Security, 2003, v. 2, n. 1, p. 59, doi. 10.1007/s10207-003-0025-5
- By:
- Publication type:
- Article
Attacking a polynomial-based cryptosystem: Polly Cracker.
- Published in:
- International Journal of Information Security, 2002, v. 1, n. 3, p. 143, doi. 10.1007/s10207-002-0012-2
- By:
- Publication type:
- Article
PRIVATE SET INTERSECTION: NEW GENERIC CONSTRUCTIONS AND FEASIBILITY RESULTS.
- Published in:
- Advances in Mathematics of Communications, 2017, v. 11, n. 3, p. 481, doi. 10.3934/amc.2017040
- By:
- Publication type:
- Article
CRYPTANALYSIS OF A 2-PARTY KEY ESTABLISHMENT BASED ON A SEMIGROUP ACTION PROBLEM.
- Published in:
- Advances in Mathematics of Communications, 2011, v. 5, n. 1, p. 87, doi. 10.3934/amc.2011.5.87
- By:
- Publication type:
- Article
ATTRIBUTE-BASED GROUP KEY ESTABLISHMENT.
- Published in:
- Advances in Mathematics of Communications, 2010, v. 4, n. 3, p. 381, doi. 10.3934/amc.2010.4.381
- By:
- Publication type:
- Article
Cryptanalysis of the Tillich-Zémor Hash Function.
- Published in:
- Journal of Cryptology, 2011, v. 24, n. 1, p. 148, doi. 10.1007/s00145-010-9063-0
- By:
- Publication type:
- Article
From Key Encapsulation to Authenticated Group Key Establishment—A Compiler for Post-Quantum Primitives †.
- Published in:
- Entropy, 2019, v. 21, n. 12, p. 1183, doi. 10.3390/e21121183
- By:
- Publication type:
- Article
Integrating Classical Preprocessing into an Optical Encryption Scheme.
- Published in:
- Entropy, 2019, v. 21, n. 9, p. 872, doi. 10.3390/e21090872
- By:
- Publication type:
- Article
Quantum circuits for $${\mathbb {F}}_{2^{n}}$$ -multiplication with subquadratic gate count.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 7, p. 2373, doi. 10.1007/s11128-015-0993-1
- By:
- Publication type:
- Article
Automatic synthesis of quantum circuits for point addition on ordinary binary elliptic curves.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 1, p. 201, doi. 10.1007/s11128-014-0851-6
- By:
- Publication type:
- Article