Conferences in DBLP
Alfred Menezes , Scott A. Vanstone The Implementation of Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:2-13 [Conf ] Kenji Koyama Direct Demonstration of the Power to Break Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:14-21 [Conf ] Zong-Duo Dai , Kencheng Zeng Continued Fractions and the Berlekamp-Massey Algorithm. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:24-31 [Conf ] Guang Gong Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:32-36 [Conf ] Yi Xian Yang K-M Sequence is Forwardly Predictable. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:37-38 [Conf ] Cunsheng Ding Lower Bounds on the Weight Complexities of Cascaded Binary Sequences. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:39-43 [Conf ] Pil Joong Lee Secure User Access Control for Public Networks. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:46-57 [Conf ] Svein J. Knapskog Formal Specification and Verification of Secure Communication Protocols. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:58-73 [Conf ] Vijay Varadharajan Network Security Policy Models. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:74-95 [Conf ] Jan C. A. van der Lubbe , Dick E. Boekee KEYMEX: An expert system for the design of key management schemes. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:96-103 [Conf ] Klaus Gaarder , Einar Snekkenes On The Formal Analysis of PKCS Authentication Protocols. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:106-121 [Conf ] Martin Anthony , Keith M. Martin , Jennifer Seberry , Peter R. Wild Some Remarks on Authentication Systems. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:122-139 [Conf ] Kazuo Ohta , Kenji Koyama Meet-in-the-Middle Attack on Digital Signature Schemes. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:140-154 [Conf ] Cees J. A. Jansen , Dick E. Boekee A Binary Sequence Generator Based on Ziv-Lempel Source Coding. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:156-164 [Conf ] Miodrag J. Mihaljevic , Jovan Dj. Golic A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:165-175 [Conf ] Reihaneh Safavi-Naini Parallel Generation of Pseudo-Random Sequences. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:176-193 [Conf ] Kencheng Zeng , Chung-Huang Yang , T. R. N. Rao Large Primes in Stream Cipher Cryptography. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:194-205 [Conf ] Helen Gustafson , Ed Dawson , William J. Caelli Comparison of Block Ciphers. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:208-220 [Conf ] Lawrence Brown , Jennifer Seberry Key Scheduling In Des Type Cryptosystems. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:221-228 [Conf ] Lawrence Brown , Josef Pieprzyk , Jennifer Seberry LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:229-236 [Conf ] Josef Pieprzyk , Xian-Mo Zhang Permutation Generators of Alternating Groups. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:237-244 [Conf ] David Chaum Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:246-264 [Conf ] Marc Girault A (non-practical) three-pass identification protocol using coding theory. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:265-272 [Conf ] Hiroki Shizuya , Kenji Koyama , Toshiya Itoh Demonstrating Possession without Revealing Factors and its Application. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:273-293 [Conf ] Barry Hayes Anonymous One-Time Signatures and Flexible Untraceable Electronic Cash. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:294-305 [Conf ] Yi Xian Yang Dyadic Matrices and Their Potential Significance in Cryptography. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:308-310 [Conf ] Rudolf Lidl , Winfried B. Müller A Note on Strong Fibonacci Pseudoprimes. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:311-317 [Conf ] Cees J. A. Jansen , Dick E. Boekee On the Significance of the Directed Acyclic Word Graph in Cryptology. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:318-326 [Conf ] Kencheng Zeng , Minqiang Huang Solving Equations in Sequences. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:327-332 [Conf ] Ronald Ferreira The Practical Application Of State Of The Art Security In Real Environments. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:334-355 [Conf ] Rodney H. Cooper , Wayne Patterson RSA as a Benchmark for Multiprocessor Machines. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:356-359 [Conf ] Vangalur S. Alagar Range Equations and Range Matrices: a Study in Statistical Database Security. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:360-385 [Conf ] Thomas Hardjono Record Encryption in Distributed Databases. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:386-395 [Conf ] Willi Geiselmann , Dieter Gollmann VLSI Design for Exponentiation in GF (2n ). [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:398-405 [Conf ] Hikaru Morita A Fast Modular-multiplication Module for Smart Cards. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:406-409 [Conf ] Michael Newberry Minòs: Extended User Authentication. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:410-423 [Conf ] Ed Dawson , Bruce Goldburg Universal Logic Sequences. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:426-432 [Conf ] John M. Carroll The Three Faces of Information Security. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:433-450 [Conf ] Mark Ames Secure Cryptographic Initialisation. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:451-462 [Conf ]