Cryptanalysis of adaptive arithmetic coding encryption schemes (German)
- New search for: Lim, J.
- New search for: Boyd, C.
- New search for: Dawson, E.
- New search for: Lim, J.
- New search for: Boyd, C.
- New search for: Dawson, E.
- New search for: Varadharajan, V.
- New search for: Pieprzyk, J.
- New search for: Mu, Y.
In:
Information security and privacy
1270
;
216-227
;
1997
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Cryptanalysis of adaptive arithmetic coding encryption schemes
-
Contributors:Lim, J. ( author ) / Boyd, C. ( author ) / Dawson, E. ( author ) / Varadharajan, V. / Pieprzyk, J. / Mu, Y.
-
Conference:Australasian conference; 2nd, Information security and privacy ; 1997 ; Sydney; Australia
-
Published in:Information security and privacy , 1270 ; 216-227LECTURE NOTES IN COMPUTER SCIENCE , 1270 ; 216-227
-
Publisher:
- New search for: Springer
-
Publication date:1997-01-01
-
Size:12 pages
-
Remarks:Also known as ACISP '97
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:German
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Trusted third parties for secure electronic commerce - Are they needed?Piper, F. et al. | 1997
- 2
-
Prospectives for modelling trust in information securityJoesang, A. et al. | 1997
- 14
-
Analysis and implementation of a formal authorisation policy design approachBai, Y. / Varadharajan, V. et al. | 1997
- 26
-
An approach to dynamic domain and type enforcementTidswell, J. / Potter, J. et al. | 1997
- 38
-
Purpose-oriented access control model in object-based systemsTachikawa, T. / Higaki, H. / Takizawa, M. et al. | 1997
- 50
-
User acces domain management system - ADAMSTerada, M. / Murayama, Y. et al. | 1997
- 50
-
User access domain management system - ADAMSTerada, M. / Murayama, Y. et al. | 1997
- 62
-
Revocation of unread email in an untrusted networkRubin, A. D. / Boneh, D. / Fu, K. et al. | 1997
- 76
-
Security issues in asynchronous transfer modeShankaran, R. / Varadharajan, V. / Hitchens, M. et al. | 1997
- 90
-
A method to implement a denial of service protection baseLeiwo, J. / Zheng, Y. et al. | 1997
- 102
-
ProtectOS: Operating system and hardware support for small objectsHolford, J. / Mohay, G. et al. | 1997
- 114
-
Practical memory checkers for stacks, queues and dequesFischlin, M. et al. | 1997
- 126
-
Panel Session: Cryptographic Policy GuidelinesCharney, S. / Perrin, S. / Orlowski, S. / Reaburn, N. et al. | 1997
- 127
-
Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fieldsLenstra, A. K. et al. | 1997
- 139
-
A new hash function based on block cipherYi, X. / Lam, K.-Y. et al. | 1997
- 147
-
New lower bounds on nonlinearity and a class of highly nonlinear functionsZhang, X.-M. / Zheng, Y. et al. | 1997
- 159
-
On the security of self-synchronous ciphersMillan, W. / Dawson, E. et al. | 1997
- 171
-
Inefficiency of variant characteristics for substitution-permutation networks with position permutationsSadowski, A. et al. | 1997
- 183
-
Secret sharing with reusable polynomialsChen, L. / Gollmann, D. / Mitchell, C. J. / Wild, P. et al. | 1997
- 194
-
A message authentication code based on Latin squaresBakhtiari, S. / Safavi-Naini, R. / Pieprzyk, J. et al. | 1997
- 204
-
Characterisation of (k, n) multi-receiver authenticationKurosawa, K. / Obana, S. et al. | 1997
- 216
-
Cryptanalysis of adaptive arithmetic coding encryption schemesLim, J. / Boyd, C. / Dawson, E. et al. | 1997
- 228
-
Fast correlation attacks and multiple linear approximationsSalmasizadeh, M. / Simpson, L. / Golic, J. D. / Dawson, E. et al. | 1997
- 240
-
Verifiable escrowed signatureMao, W. et al. | 1997
- 249
-
Democratic key escrow schemeMan, C. W. / Safavi-Naini, R. et al. | 1997
- 261
-
Design and analyses of two basic protocols for use in TTP-based key escrowBao, F. / Deng, R. / Han, Y. / Jeng, A. et al. | 1997
- 271
-
Protection of data and delegated keys in digital distributionMambo, M. / Okamoto, E. / Sakurai, K. et al. | 1997
- 283
-
New micropayment schemes based on PayWordsMu, Y. / Varadharajan, V. / Lin, Y.-X. et al. | 1997
- 294
-
On key agreement and conference key agreementBoyd, C. et al. | 1997
- 303
-
Identity-based and self-certified key-exchange protocolsSaeednia, S. et al. | 1997
- 314
-
Enabling technology for the trading of MPEG-encoded videoDittmann, J. / Steinmetz, A. et al. | 1997
- 325
-
Image distribution method with embedded identifier scheme for copyright protectionAbe, T. / Fujii, H. / Kushima, K. et al. | 1997