scientific article; zbMATH DE number 1006115

From MaRDI portal
Publication:4335813

zbMath0883.94001MaRDI QIDQ4335813

Bruce Schneier

Publication date: 4 May 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (40)

Quantum bit-commitment for small storage based on quantum one-way permutationsBisplitting an arbitrary \(N\)-qubit state with a class of asymmetric three-qubit W statesAn N-D cryptoschemeThe Multics encipher_AlgorithmA Simplified IDEA AlgorithmComments on e-mail protocols providing forward secrecyA Modified Technique for Reliable Image Encryption Method using Merkle-Hellman Cryptosystem and Rsa AlgorithmUnnamed ItemEvolutionary ciphers against differential power analysis and differential fault analysisQuantum secret sharing of secure direct communication using one-time padImplementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computerOn min-max \(r\)-gatheringsCryptanalysis of quantum blind signature schemeDecidability of equivalence of symbolic derivationsA note on chaotic unimodal maps and applicationsGeneration of pseudorandom sequence over elliptic curve group and their propertiesApplying LU decomposition of matrices to design anonymity bilateral remote user authentication schemeProtocol completion incentive problems in cryptographic Vickrey auctionsThe concept of decentralized and secure electronic marketplaceGeneralization of the Self-Shrinking Generator in the Galois FieldKey exchange protocols over noncommutative rings. The case ofIdentification scheme for romanized Indian languages from their plain and ciphered bit streamOn multiple transitivity for products of sets of permutations.Proved Random Numbers Obtained from Hardware DevicesA fair and efficient solution to the socialist millionaires' problemAgent based scientific simulation and modelingA secure and robust hash-based scheme for image authenticationHow to Fill Up Merkle-Damgård Hash FunctionsUnnamed ItemOn Min-Max r-GatheringsKnowledge condition gamesOn a family of preimage-resistant functionsA generic framework for anonymous authentication in mobile networksThe Power of Anonymous Veto in Public DiscussionDecrypting classical cipher text using Markov chain Monte CarloExtended DSAAn Introduction to Security API AnalysisBounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number GeneratorsFaster MulticollisionsEncryption and Fragmentation for Data Confidentiality in the Cloud




This page was built for publication: