default search action
Cryptographic Algorithms and their Uses 2004: Surfers Paradise, Gold Coast, Australia
- Ed Dawson, Wolfgang Klemm:
Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings. Queensland University of Technology 2004, ISBN 1-74107-064-3
Hash Functions and Stream Ciphers
- Praveen Gauravaram, William Millan:
Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE). Cryptographic Algorithms and their Uses 2004: 1-13 - Kevin Chen, William Millan, Leonie Ruth Simpson:
Perspectives on Word Based Stream Ciphers. Cryptographic Algorithms and their Uses 2004: 14-27 - Praveen Gauravaram, William Millan, Lauren May:
CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique. Cryptographic Algorithms and their Uses 2004: 28-39
Cryptographic Protocols
- Lan Nguyen, Reihaneh Safavi-Naini:
An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System. Cryptographic Algorithms and their Uses 2004: 40-56 - Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee:
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. Cryptographic Algorithms and their Uses 2004: 57-71 - Hossein Ghodosi, Josef Pieprzyk:
A Modification to the 'Authentication of Concast Communication'. Cryptographic Algorithms and their Uses 2004: 72-77
Implementation Issues
- Christopher Wolf:
Efficient Public Key Generation for HFE and Variations. Cryptographic Algorithms and their Uses 2004: 78-93 - Jaimee Brown, Ed Dawson, Juan Manuel González Nieto:
Implementation of the GBD Cryptosystem. Cryptographic Algorithms and their Uses 2004: 94-109 - Matthew Henricksen, Ming Yao, Ernest Foo:
An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. Cryptographic Algorithms and their Uses 2004: 110-124
Applications
- Chris Wullems, Harikrishna Vasanta, Mark Looi, Andrew J. Clark:
A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation. Cryptographic Algorithms and their Uses 2004: 125-139
Cryptanalysis
- Mike Bond, Jolyon Clulow:
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure). Cryptographic Algorithms and their Uses 2004: 140-151 - Yousef Bani Hammad, Gary Carter, Ed Dawson, Yvonne Hitchcock:
Improvements to the RAK Factoring Algorithm. Cryptographic Algorithms and their Uses 2004: 152-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.