Found: 5
Select item for more details and to access through your institution.
Weakness in Quaternion Signatures.
- Published in:
- Journal of Cryptology, 2001, v. 14, n. 2, p. 77, doi. 10.1007/s001450010006
- By:
- Publication type:
- Article
Cryptanalysis of the Chor--Rivest Cryptosystem.
- Published in:
- Journal of Cryptology, 2001, v. 14, n. 2, p. 87, doi. 10.1007/s001450010005
- By:
- Publication type:
- Article
On the Importance of Eliminating Errors in Cryptographic Computations.
- Published in:
- Journal of Cryptology, 2001, v. 14, n. 2, p. 101, doi. 10.1007/s001450010016
- By:
- Publication type:
- Article
Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question.
- Published in:
- Journal of Cryptology, 2001, v. 14, n. 2, p. 121, doi. 10.1007/s00145-001-0002-y
- By:
- Publication type:
- Article
Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions.
- Published in:
- Journal of Cryptology, 2001, v. 14, n. 2, p. 137, doi. 10.1007/s00145-001-0001-z
- By:
- Publication type:
- Article