default search action
Cryptography: Policy and Algorithms 1995: Brisbane, Queensland, Australia
- Ed Dawson, Jovan Dj. Golic:
Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings. Lecture Notes in Computer Science 1029, Springer 1995, ISBN 3-540-60759-5
Cryptographic Policy
- William J. Caelli:
Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement? 1-19 - Willis H. Ware:
Privacy and Security Policy Choices in an NII Environment. 20-39 - William J. Caelli:
Commercial Key Escrow: An Australian Perspective. 40-64 - Steve Orlowski:
Encryption and the Gloval Information Infrastructure: An Australian Perspective. 65-74 - Ross J. Anderson:
Crypto in Europe - Markets, Law and Policy. 75-89 - Mark Ames:
Saving Dollars Makes Sense of Crypto Export Controls. 90-97
Key Escrow and Secret Sharing
- Nigel Jefferies, Chris J. Mitchell, Michael Walker:
A Proposed Architecture for Trusted Third Party Services. 98-104 - He Jingmin, Ed Dawson:
A New Key Escrow Cryptosystem. 105-114 - He Jingmin, Ed Dawson:
How to Fairly Reconstruct a Shared Secret. 115-124
Block and Stream Ciphers
- Jovan Dj. Golic:
A Note on Nonuniform Decimation of Periodic Sequences. 125-131 - Helen Gustafson, Ed Dawson, Jovan Dj. Golic:
Randomness Measures Related to Subset Occurrence. 132-143 - William Millan:
Low Order Approximation of Cipher Functions. 144-155 - Ivan Damgård, Lars R. Knudsen:
Multiple Encryption with Minimum Key. 156-164 - Marc Gysin:
A One-Key Cryptosystem Based on a Finite Nonlinear Automaton. 165-173 - Jovan Dj. Golic, Luke O'Connor:
A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps. 174-185 - Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew J. Clark, Abdollah Khodkar, Ed Dawson:
Discrete Optimisation and Fast Correlation Attacks. 186-200
Authentication Techniques, Public Key Protocols and Hashing Techniques
- Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk:
Keyed Hash Functions. 201-214 - Shin-Jia Hwang, Chin-Chen Chang, Wei-Pang Yang:
Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. 215-227 - Chi-Sung Laih, Wen-Chung Kuo:
Cryptanalysis of the Enhanced ElGamal's Signature Scheme. 228-231 - Lidong Chen:
Access with Pseudonyms. 232-243 - Kefei Chen:
A New Identification Algorithm. 244-249
Smart Cards and Cryptography
- Andreas Fuchsberger, Dieter Gollmann, Paul J. G. Lothian, Kenneth G. Paterson, Abraham Sidiropoulos:
Public-key Cryptography on Smart Cards. 250-269 - Gary Gaskell, Mark Looi:
Integrating Smart Cards Into Authentication Systems. 270-281 - Jaroslav Hruby:
Smart Card with Interferometric Quantum Cryptography Device. 282-289
Applications of Cryptography
- Dieter Gollmann:
Cryptographic APIs. 290-300 - Selwyn Russell:
Foiling Active Network Impersonisation Attacks Made in Collusion with an Insider. 301-312 - George M. Mohay, Hasmukh Morarji, Q. Le Viet, Lance Munday, William J. Caelli:
The CASS Shell. 313-325
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.