531 – 533 of 533
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 1991
-
Mark
On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2
1991) Conference on the Theory and Application of Cryptology, 1990 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 473 LNCS. p.306-312(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1988
-
Mark
Windmill generators a generalization and an observation of how many there are
1988) 6th European Workshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1988 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 330 LNCS. p.325-330(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1986
-
Mark
A Comment on Niederreiter’s Public Key Cryptosystem
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding