Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Secret key")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 785

  • Page / 32
Export

Selection :

  • and

Secret key capacity for optimally correlated sources under sampling attackMURAMATSU, Jun; YOSHIMURA, Kazuyuki; ARAI, Kenichi et al.IEEE transactions on information theory. 2006, Vol 52, Num 11, pp 5140-5151, issn 0018-9448, 12 p.Article

When Is a Function Securely Computable?TYAGI, Himanshu; NARAYAN, Prakash; GUPTA, Piyush et al.IEEE transactions on information theory. 2011, Vol 57, Num 10, pp 6337-6350, issn 0018-9448, 14 p.Article

Weakness in quaternion signaturesCOPPERSMITH, D.Lecture notes in computer science. 1999, pp 305-314, issn 0302-9743, isbn 3-540-66347-9Conference Paper

Linking classical and quantum key agreement: Is there a classical analog to bound entanglement?GISIN, Nicolas; RENNER, Renato; WOLF, Stefan et al.Algorithmica. 2002, Vol 34, Num 4, pp 389-412, issn 0178-4617, 24 p.Article

A Secure Information Transmission Scheme With a Secret Key Based on Polar CodingKIM, Young-Sik; KIM, Jong-Hwan; KIM, Sang-Hyo et al.IEEE communications letters. 2014, Vol 18, Num 6, pp 937-940, issn 1089-7798, 4 p.Article

La cryptographie à clé secrète = Secret key cryptographyPATARIN, Jacques.Pour la science. 2002, Num 291, pp 76-83, issn 0153-4092Article

An efficient strong designated verifier signature schemeSAEEDNIA, Shahrokh; KREMER, Steve; MARKOWITCH, Olivier et al.Lecture notes in computer science. 2004, pp 40-54, issn 0302-9743, isbn 3-540-21376-7, 15 p.Conference Paper

Weaknesses in the key scheduling algorithm of RC4FLUHRER, Scott; MANTIN, Itsik; SHAMIR, Adi et al.Lecture notes in computer science. 2001, pp 1-24, issn 0302-9743, isbn 3-540-43066-0Conference Paper

Single-key AIL-MACs from any FIL-MACMAURER, Ueli; SJÖDIN, Johan.Lecture notes in computer science. 2005, pp 472-484, issn 0302-9743, isbn 3-540-27580-0, 13 p.Conference Paper

Generalized key-evolving signature schemes or how to foil an armed adversaryITKIS, Gene; PENG XIE.Lecture notes in computer science. 2003, pp 151-168, issn 0302-9743, isbn 3-540-20208-0, 18 p.Conference Paper

Contemporary block ciphersKNUDSEN, L. R.Lecture notes in computer science. 1999, pp 105-126, issn 0302-9743, isbn 3-540-65757-6Conference Paper

Chaffinch: Confidentiality in the face of legal threatsCLAYTON, Richard; DANEZIS, George.Lecture notes in computer science. 2003, pp 70-86, issn 0302-9743, isbn 3-540-00421-1, 17 p.Conference Paper

Attacking the affine parts of SFLASHGEISELMANN, Willi; STEINWANDT, Rainer; BETH, Thomas et al.Lecture notes in computer science. 2001, pp 355-359, issn 0302-9743, isbn 3-540-43026-1Conference Paper

Efficient methods for integrating traceability and broadcast encryptionGAFNI, E; STADDON, J; YIN, Y. L et al.Lecture notes in computer science. 1999, pp 372-387, issn 0302-9743, isbn 3-540-66347-9Conference Paper

Truncated differentials and SkipjackKNUDSEN, L. R; ROBSHAW, M. J. B; WAGNER, D et al.Lecture notes in computer science. 1999, pp 165-180, issn 0302-9743, isbn 3-540-66347-9Conference Paper

How Many Queries Will Resolve Common Randomness?TYAGI, Himanshu; NARAYAN, Prakash.IEEE transactions on information theory. 2013, Vol 59, Num 9, pp 5363-5378, issn 0018-9448, 16 p.Article

Separation of Reliability and Secrecy in Rate-Limited Secret-Key GenerationCHOU, Rémi A; BLOCH, Matthieu R.IEEE transactions on information theory. 2014, Vol 60, Num 8, pp 4941-4957, issn 0018-9448, 17 p.Article

Perfect Omniscience, Perfect Secrecy, and Steiner Tree PackingNITINAWARAT, Sirin; NARAYAN, Prakash.IEEE transactions on information theory. 2010, Vol 56, Num 12, pp 6490-6500, issn 0018-9448, 11 p.Article

Secret Key Generation for a Pairwise Independent Network ModelNITINAWARAT, Sirin; CHUNXUAN YE; BARG, Alexander et al.IEEE transactions on information theory. 2010, Vol 56, Num 12, pp 6482-6489, issn 0018-9448, 8 p.Article

Analysis of the non-linear part of mugiBIRYUKOV, Alex; SHAMIR, Adi.Lecture notes in computer science. 2005, pp 320-329, issn 0302-9743, isbn 3-540-26541-4, 10 p.Conference Paper

Quantum cryptography with floating basis protocolKUROCHKIN, Yury.Proceedings of SPIE, the International Society for Optical Engineering. 2005, pp 213-221, issn 0277-786X, isbn 0-8194-5827-9, 1Vol, 9 p.Conference Paper

The effect of side-information on smooth entropyBO YANG; TONG ZHANG; CHANGXING PEI et al.Discrete applied mathematics. 2004, Vol 136, Num 1, pp 151-157, issn 0166-218X, 7 p.Article

Higher Order Differential Attack of Camellia(II)HATANO, Yasuo; SEKINE, Hiroki; KANEKO, Toshinobu et al.Lecture notes in computer science. 2003, pp 129-146, issn 0302-9743, isbn 3-540-00622-2, 18 p.Conference Paper

Hyper-encryption and everlasting securityYAN ZONG DING; RABIN, Michael O.Lecture notes in computer science. 2002, pp 1-26, issn 0302-9743, isbn 3-540-43283-3Conference Paper

On the Distribution of a Key Distribution CenterD'ARCO, Paolo.Lecture notes in computer science. 2001, pp 357-369, issn 0302-9743, isbn 3-540-42672-8Conference Paper

  • Page / 32