Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-4
|
Results: 4
SECURITY ANALYSIS OF THE MESSAGE AUTHENTICATOR ALGORITHM (MAA)
Authors:
PRENEEL B RIJMEN V VANOORSCHOT PC
Citation:
B. Preneel et al., SECURITY ANALYSIS OF THE MESSAGE AUTHENTICATOR ALGORITHM (MAA), European transactions on telecommunications, 8(5), 1997, pp. 455-470
KEY RECOVERY ATTACK ON ANSI X9.19 RETAIL MAC
Authors:
PRENEEL B VANOORSCHOT PC
Citation:
B. Preneel et Pc. Vanoorschot, KEY RECOVERY ATTACK ON ANSI X9.19 RETAIL MAC, Electronics Letters, 32(17), 1996, pp. 1568-1569
MODERN KEY AGREEMENT TECHNIQUES
Authors:
RUEPPEL RA VANOORSCHOT PC
Citation:
Ra. Rueppel et Pc. Vanoorschot, MODERN KEY AGREEMENT TECHNIQUES, Computer communications, 17(7), 1994, pp. 458-465
SUBGROUP REFINEMENT ALGORITHMS FOR ROOT FINDING IN GF(Q)
Authors:
MENEZES AJ VANOORSCHOT PC VANSTONE SA
Citation:
Aj. Menezes et al., SUBGROUP REFINEMENT ALGORITHMS FOR ROOT FINDING IN GF(Q), SIAM journal on computing, 21(2), 1992, pp. 228-239
Risultati:
1-4
|