scientific article; zbMATH DE number 1006115
From MaRDI portal
Publication:4335813
zbMATH Open0883.94001MaRDI QIDQ4335813FDOQ4335813
Authors: Bruce Schneier
Publication date: 4 May 1997
Title of this publication is not available (Why is that?)
Cryptography (94A60) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01)
Cited In (42)
- Decidability of equivalence of symbolic derivations
- A Modified Technique for Reliable Image Encryption Method using Merkle-Hellman Cryptosystem and Rsa Algorithm
- How to Fill Up Merkle-Damgård Hash Functions
- Generation of pseudorandom sequence over elliptic curve group and their properties
- The Power of Anonymous Veto in Public Discussion
- Agent based scientific simulation and modeling
- Extended DSA
- On a family of preimage-resistant functions
- Encryption and Fragmentation for Data Confidentiality in the Cloud
- Quantum bit-commitment for small storage based on quantum one-way permutations
- A secure and robust hash-based scheme for image authentication
- On multiple transitivity for products of sets of permutations.
- A fair and efficient solution to the socialist millionaires' problem
- Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer
- Knowledge condition games
- An introduction to security API analysis
- Quantum secret sharing of secure direct communication using one-time pad
- Comments on e-mail protocols providing forward secrecy
- Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators
- A generic framework for anonymous authentication in mobile networks
- Identification scheme for Romanized Indian languages from their plain and ciphered bit stream
- Proved random numbers obtained from hardware devices
- A note on chaotic unimodal maps and applications
- Faster Multicollisions
- Fine-Grained Cryptography
- Spooky Encryption and Its Applications
- Applying LU decomposition of matrices to design anonymity bilateral remote user authentication scheme
- On min-max \(r\)-gatherings
- An N-D cryptoscheme
- Protocol completion incentive problems in cryptographic Vickrey auctions
- Evolutionary ciphers against differential power analysis and differential fault analysis
- A Simplified IDEA Algorithm
- The Multics encipher_Algorithm
- Decrypting classical cipher text using Markov chain Monte Carlo
- Generalization of the Self-Shrinking Generator in the Galois Field
- The concept of decentralized and secure electronic marketplace
- Bisplitting an arbitrary \(N\)-qubit state with a class of asymmetric three-qubit W states
- Linear and differential cryptanalysis of Russian GOST
- Title not available (Why is that?)
- Cryptanalysis of quantum blind signature scheme
- Key exchange protocols over noncommutative rings. The case of End(\(\mathbb Z_p \times \mathbb Z_{p^{2}}\))
- On Min-Max r-Gatherings
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4335813)