The following pages link to Information Security Applications (Q2902217):
Displayed 10 items.
- Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward (Q2902218) (← links)
- Public Key Authentication with Memory Tokens (Q3605389) (← links)
- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures (Q3605390) (← links)
- Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme (Q3605391) (← links)
- Sanitizable and Deletable Signature (Q3605392) (← links)
- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512 (Q3605393) (← links)
- Ternary Subset Difference Method and Its Quantitative Analysis (Q3605394) (← links)
- A Probing Attack on AES (Q3605395) (← links)
- On Avoiding ZVP-Attacks Using Isogeny Volcanoes (Q3605396) (← links)
- Tate Pairing Computation on Generalized Hessian Curves (Q5400651) (← links)