151 – 160 of 172
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 1997
-
Mark
Bucket hashing with a small key size'
(1997) nternational Conference on the Theory and Application of Cryptographic Techniques EUROCRYPT ’97 1233. p.149-162
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Almost k-wise independent sample spaces and their cryptologic applications
(1997) International Conference on the Theory and Application of Cryptographic Techniques - EUROCRYPT'97 1233. p.409-421
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Codes combining error detection and authentication
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Coding problems of cryptography or codesets vs. codewords
- Contribution to conference › Paper, not in proceeding
- 1996
-
Mark
Universal hash functions from exponential sums over finite fields and Galois rings
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the cardinality of systematic authentication codes via error-correcting codes
- Contribution to journal › Article
-
Mark
Relations between error-correcting codes, authentication
(1996) Computer Security, Cryptology and Coding theory research program, Cambridge
- Contribution to conference › Abstract
- 1995
-
Mark
On A2-codes including arbiter's attacks
(1995) Workshop on the Theory and Application of Cryptographic Techniques EUROCRYPT'94 950. p.456-461
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Authentication codes for non-trusting parties obtained from rank metric codes
- Contribution to journal › Article
-
Mark
Authentication codes protecting against collusion attacks
- Contribution to conference › Paper, not in proceeding
