Fakultät für Informatik
-
Technische Universität München
Lehrstuhl für Effiziente Algorithmen
Die bibliographische Datenbank LEABib
Suchen
•
Liste der Journale
•
Liste der Serien
•
Liste der Konferenzen
•
Ausgewählte Publikationen
Hilfe
Suche: Series=LNCS AND Volume=839
Als [
bib
] [
pdf
] [
ps
] [
dvi
] [
xml
] herunterladen.
Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
Ueli M. Maurer
Lecture Notes in Computer Science
839
, 1994, pp. 271-281
Fast generation of provable primes using search in arithmetic progressions
Preda Mihailescu
Lecture Notes in Computer Science
839
, 1994, pp. 282-293
Attack on the cryptographic scheme NIKS-TAS
Don Coppersmith
Lecture Notes in Computer Science
839
, 1994, pp. 294-307
On the risk of opening distributed keys
Mike Burmester
Lecture Notes in Computer Science
839
, 1994, pp. 308-317
Cryptanalysis of cryptosystems based on remote chaos replication
Th. Beth
,
D.E. Lazic
,
A. Mathias
Lecture Notes in Computer Science
839
, 1994, pp. 318-331
A Fourier Transform approach to the linear complexity of nonlinearly filtered sequences
James L. Massey
,
Shirlei Serconek
Lecture Notes in Computer Science
839
, 1994, pp. 332-340
The security of cipher block chaining
Mihir Bellare
,
Joe Kilian
,
Phillip Rogaway
Lecture Notes in Computer Science
839
, 1994, pp. 341-358
A chosen plaintext attack of the 16-round Khufu cryptosystem
Henri Gilbert
,
Pascal Chauvaud
Lecture Notes in Computer Science
839
, 1994, pp. 359-368
Ciphertext only attack for one-way function of the MAP using one ciphertext
Yukiyasu Tsunoo
,
Eiji Okamoto
,
Tomohiko Uyematsu
Lecture Notes in Computer Science
839
, 1994, pp. 369-382
Pitfalls in designing substitution boxes
Jennifer Seberry
,
Xian-Mo Zhang
,
Yuliang Zheng
Lecture Notes in Computer Science
839
, 1994, pp. 383-396
A randomness-rounds tradeoff in private computation
Eyal Kushilevitz
,
Adi Rosén
Lecture Notes in Computer Science
839
, 1994, pp. 397-410
Secure voting using partially compatible homomorphisms
Kazue Sako
,
Joe Kilian
Lecture Notes in Computer Science
839
, 1994, pp. 411-424
Maintaining security in the presence of transient faults
Ran Canetti
,
Amir Herzberg
Lecture Notes in Computer Science
839
, 1994, pp. 425-438
Seiten
<
1
2