3

On constant-round zero-knowledge proofs of knowledge for NP-relations

Year:
2010
Language:
english
File:
PDF, 238 KB
english, 2010
8

Direct Resource Hijacking in Android is Still Dangerous

Year:
2015
Language:
english
File:
PDF, 246 KB
english, 2015
9

Trusted Computing (Principles and Applications) || 2. Trusted Platform Module

Year:
2017
Language:
english
File:
PDF, 261 KB
english, 2017
14

Using mobile phones to enhance computing platform trust

Year:
2018
Language:
english
File:
PDF, 2.49 MB
english, 2018
17

Cryptanalysis of some signature schemes with message recovery

Year:
2005
Language:
english
File:
PDF, 145 KB
english, 2005
18

Three characterizations of correlation-immune functions over rings ZN

Year:
1999
Language:
english
File:
PDF, 88 KB
english, 1999
20

Maximum correlation analysis of nonlinear combining functions

Year:
1998
Language:
english
File:
PDF, 290 KB
english, 1998
21

Study on strand space model theory

Year:
2003
Language:
english
File:
PDF, 1.62 MB
english, 2003
22

Security analysis of a new stream cipher

Year:
2006
Language:
english
File:
PDF, 756 KB
english, 2006
23

Survey of information security

Year:
2007
Language:
english
File:
PDF, 864 KB
english, 2007
27

A property-based attestation protocol for TCM

Year:
2010
Language:
english
File:
PDF, 255 KB
english, 2010
28

Black-box testing based on colorful taint analysis

Year:
2012
Language:
english
File:
PDF, 446 KB
english, 2012
29

Improved multi-pass fast correlation attacks with applications

Year:
2011
Language:
english
File:
PDF, 261 KB
english, 2011
31

Asynchronous Byzantine Agreement Protocol based on verifiable signature sharing

Year:
2006
Language:
english
File:
PDF, 234 KB
english, 2006
32

Fast correlation attacks on Bluetooth combiner

Year:
2006
Language:
english
File:
PDF, 219 KB
english, 2006
34

Proof of Chabaud and Vaudenay’s almost bent functions conjecture

Year:
1999
Language:
english
File:
PDF, 103 KB
english, 1999
38

On Lin–Bose problem

Year:
2004
Language:
english
File:
PDF, 177 KB
english, 2004
39

Linear cryptanalysis of NUSH block cipher

Year:
2002
Language:
english
File:
PDF, 459 KB
english, 2002
40

Collision attack on reduced-round Camellia

Year:
2005
Language:
english
File:
PDF, 167 KB
english, 2005
41

An attack on hash function HAVAL-128

Year:
2005
Language:
english
File:
PDF, 175 KB
english, 2005
42

On the security of PPPoE network

Year:
2012
Language:
english
File:
PDF, 426 KB
english, 2012
43

Constructing and analyzing a class of controllable sequences

Year:
1995
Language:
english
File:
PDF, 165 KB
english, 1995
44

On Quadratic Bent Functions in Polynomial Forms

Year:
2007
Language:
english
File:
PDF, 246 KB
english, 2007
47

The Weight Enumerator of a Class of Cyclic Codes

Year:
2011
Language:
english
File:
PDF, 188 KB
english, 2011
50

Fast password recovery attack: application to APOP

Year:
2014
Language:
english
File:
PDF, 274 KB
english, 2014