Pages that link to "Item:Q5385534"
From MaRDI portal
The following pages link to Information Security and Cryptology – ICISC 2006 (Q5385534):
Displayed 28 items.
- RFID Privacy Based on Public-Key Cryptography (Q5385535) (← links)
- Generic Attacks on Symmetric Ciphers (Q5385536) (← links)
- Improved Collision Attack on the Hash Function Proposed at PKC’98 (Q5385537) (← links)
- Hashing with Polynomials (Q5385538) (← links)
- Birthday Paradox for Multi-collisions (Q5385540) (← links)
- New Variant of the Self-Shrinking Generator and Its Cryptographic Properties (Q5385542) (← links)
- On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher (Q5385544) (← links)
- On Algebraic Immunity and Annihilators (Q5385545) (← links)
- High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem (Q5385547) (← links)
- A High-Speed Square Root Algorithm in Extension Fields (Q5385549) (← links)
- The Smallest ARIA Module with 16-Bit Architecture (Q5385552) (← links)
- A Simpler Sieving Device: Combining ECM and TWIRL (Q5385554) (← links)
- Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks (Q5385555) (← links)
- A Time-Frame Based Trust Model for P2P Systems (Q5385557) (← links)
- Spatial Context in Role-Based Access Control (Q5385558) (← links)
- An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks (Q5385560) (← links)
- Mobile RFID Applications and Security Challenges (Q5385562) (← links)
- An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time (Q5385567) (← links)
- A Copy Protection Technique Using Multi-level Error Coding (Q5385570) (← links)
- Digital Rights Management with Right Delegation for Home Networks (Q5385572) (← links)
- Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical SVM (Q5385575) (← links)
- Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction (Q5385577) (← links)
- Cryptanalysis of T-Function-Based Hash Functions (Q5385578) (← links)
- Collision Search Attack for 53-Step HAS-160 (Q5385579) (← links)
- Klein Bottle Routing: An Alternative to Onion Routing and Mix Network (Q5385580) (← links)
- New Constructions of Constant Size Ciphertext HIBE Without Random Oracle (Q5385581) (← links)
- A New Proxy Signature Scheme Providing Self-delegation (Q5385582) (← links)
- Extended Sanitizable Signatures (Q5385583) (← links)