


default search action
Cryptographic Algorithms and their Uses 2004: Surfers Paradise, Gold Coast, Australia
- Ed Dawson, Wolfgang Klemm:

Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings. Queensland University of Technology 2004, ISBN 1-74107-064-3
Hash Functions and Stream Ciphers
- Praveen Gauravaram, William Millan:

Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE). Cryptographic Algorithms and their Uses 2004: 1-13 - Kevin Chen, William Millan, Leonie Ruth Simpson:

Perspectives on Word Based Stream Ciphers. Cryptographic Algorithms and their Uses 2004: 14-27 - Praveen Gauravaram, William Millan, Lauren May:

CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique. Cryptographic Algorithms and their Uses 2004: 28-39
Cryptographic Protocols
- Lan Nguyen, Reihaneh Safavi-Naini:

An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System. Cryptographic Algorithms and their Uses 2004: 40-56 - Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee:

A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. Cryptographic Algorithms and their Uses 2004: 57-71 - Hossein Ghodosi, Josef Pieprzyk:

A Modification to the 'Authentication of Concast Communication'. Cryptographic Algorithms and their Uses 2004: 72-77
Implementation Issues
- Christopher Wolf:

Efficient Public Key Generation for HFE and Variations. Cryptographic Algorithms and their Uses 2004: 78-93 - Jaimee Brown, Ed Dawson, Juan Manuel González Nieto:

Implementation of the GBD Cryptosystem. Cryptographic Algorithms and their Uses 2004: 94-109 - Matthew Henricksen, Ming Yao, Ernest Foo:

An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. Cryptographic Algorithms and their Uses 2004: 110-124
Applications
- Chris Wullems, Harikrishna Vasanta, Mark Looi, Andrew J. Clark:

A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation. Cryptographic Algorithms and their Uses 2004: 125-139
Cryptanalysis
- Mike Bond, Jolyon Clulow:

Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure). Cryptographic Algorithms and their Uses 2004: 140-151 - Yousef Bani Hammad, Gary Carter, Ed Dawson, Yvonne Hitchcock:

Improvements to the RAK Factoring Algorithm. Cryptographic Algorithms and their Uses 2004: 152-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














