501 – 517 of 517
- show: 100
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 1997
-
Mark
Registration of abdominal CT and SPECT images using Compton scatter data
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Bucket hashing with a small key size'
1997) nternational Conference on the Theory and Application of Cryptographic Techniques EUROCRYPT ’97 1233. p.149-162(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Almost k-wise independent sample spaces and their cryptologic applications
1997) International Conference on the Theory and Application of Cryptographic Techniques - EUROCRYPT'97 1233. p.409-421(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A digital signature scheme based on random error-correcting codes
1997) 6th IMA International Conference on Cryptography and Coding, 1997 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1355. p.161-167(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast message authentication using efficient polynomial evaluation
1997) 4th International Workshop on Fast Software Encryption, FSE 1997 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1267. p.190-204(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1996
-
Mark
Universal hash functions from exponential sums over finite fields and Galois rings
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1995
-
Mark
On A2-codes including arbiter's attacks
1995) Workshop on the Theory and Application of Cryptographic Techniques EUROCRYPT'94 950. p.456-461(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast exponentation in cryptography
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1994
-
Mark
A bit-serial CMOS digital IF-filter for mobile radio using an on-chip clock
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fundamental difficulties with projective normalization of planar curves
1994) Second Joint European - US Workshop Applications of Invariance in Computer Vision In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 825 LNCS. p.199-214(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1993
-
Mark
On the relation between A-codes and codes correcting independent errors
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the construction of universal families of hash functions via geometric codes and concatenation
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the construction of perfect authentication codes that permit arbitration
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1991
-
Mark
On a fast correlation attack on certain streaxn ciphers
1991) Workshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1991 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 547 LNCS. p.176-185(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2
1991) Conference on the Theory and Application of Cryptology, 1990 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 473 LNCS. p.306-312(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1988
-
Mark
Windmill generators a generalization and an observation of how many there are
1988) 6th European Workshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1988 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 330 LNCS. p.325-330(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1986
-
Mark
A Comment on Niederreiter’s Public Key Cryptosystem
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding