Current Search:  Reed, John K. (x) » Department of Mathematical Sciences (x) » Data encryption (Computer science) (x)

View All Items

  • CSV Spreadsheet
(1 - 15 of 15)
algebraic attack on block ciphers
Cryptography in the presence of key-dependent messages
Design and analysis of key establishment protocols
discrete logarithm problem in non-abelian groups
Distinguishability of Public Keys and Experimental Validation: The McEliece Public-Keyed Cryptosystem
Elliptic curves: identity-based signing and quantum arithmetic
Low rank transitive representations, primitive extensions, and the collision problem in PSL (2, q)
Message authentication in an identity-based encryption scheme
New Results in Group Theoretic Cryptology
Password-authenticated two-party key exchange with long-term security
Quantum Circuits for Cryptanalysis
Quantum Circuits for Symmetric Cryptanalysis
Quantum-Resistant Key Agreement and Key Encapsulation
Shamir's secret sharing scheme using floating point arithmetic
Signature schemes in single and multi-user settings