Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors (English)
National licence
- New search for: Zhang, Xian-Mo
- New search for: Zheng, Yuliang
- New search for: Zhang, Xian-Mo
- New search for: Zheng, Yuliang
In:
Designs, Codes and Cryptography
;
7
, 1
;
111-134
;
1996
- Article (Journal) / Electronic Resource
-
Title:Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors
-
Contributors:Zhang, Xian-Mo ( author ) / Zheng, Yuliang ( author )
-
Published in:Designs, Codes and Cryptography ; 7, 1 ; 111-134
-
Publisher:
- New search for: Kluwer Academic Publishers
-
Place of publication:Boston
-
Publication date:1996-01-01
-
Size:24 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 7, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 7
-
Foreword to this issue| 1996
- 9
-
The national security establishment and the development of public-key cryptography| 1996
- 13
-
"And Now For Something Completely Different" (The Egyptologist and the Cryptographer: A Personal Reminiscence)Fischer, Mary et al. | 1996
- 17
-
Watching the bhang meter and flying through dirtBeth, Thomas et al. | 1996
- 17
-
Watching the Bhang Meter and Flying throughBeth, D. T. et al. | 1996
- 27
-
A formal language for cryptographic protocol requirementsSyverson, Paul / Meadows, Catherine et al. | 1996
- 61
-
Message recovery for signature schemes based on the discrete logarithm problemNyberg, Kaisa / Rueppel, Rainer A. et al. | 1996
- 83
-
Authentication codes in plaintext and chosen-content attacksSafavi-Naini, R. / Tombak, L. et al. | 1996
- 101
-
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing SchemesMitchell, C. J. / Piper, F. C. / Walker, M. / Wild, P. et al. | 1996
- 111
-
Characterizing the structures of cryptographic functions satisfying the propagation criterion for almost all vectorsZhang, Xian-Mo / Zheng, Yuliang et al. | 1996
- 135
-
Redundant Integer Representations and Fast ExponentiationGollmann, Dieter / Han, Yongfei / Mitchell, Chris J. et al. | 1996
- 153
-
Key-exchange in real quadratic congruence function fieldsScheidler, R. / Stein, A. / Williams, Hugh C. et al. | 1996
- I
-
Erratum| 1996