Works matching IS 20082045 AND DT 2015 AND VI 7 AND IP 2
Results: 6
Cryptanalysis of Some First Round CAESAR Candidates.
- Published in:
- ISeCure, 2015, v. 7, n. 2, p. 1
- By:
- Publication type:
- Article
Computationally Secure Multiple Secret Sharing: Models, Schemes, and Formal Security Analysis.
- Published in:
- ISeCure, 2015, v. 7, n. 2, p. 1
- By:
- Publication type:
- Article
Efficient Implementation of Low Time Complexity and Pipelined Bit-Parallel Polynomial Basis Multiplier over Binary Finite Fields.
- Published in:
- ISeCure, 2015, v. 7, n. 2, p. 1
- By:
- Publication type:
- Article
Enhancing Privacy of Recent Authentication Schemes for Low-Cost RFID Systems.
- Published in:
- ISeCure, 2015, v. 7, n. 2, p. 1
- By:
- Publication type:
- Article
A Collusion Mitigation Scheme for Reputation Systems.
- Published in:
- ISeCure, 2015, v. 7, n. 2, p. 1
- By:
- Publication type:
- Article
EEH:AGGH-Like Public Key Cryptosystem Over The Eisenstein Integers Using Polynomial Representations.
- Published in:
- ISeCure, 2015, v. 7, n. 2, p. 1
- By:
- Publication type:
- Article