Sciweavers

51 search results - page 1 / 11
» asiacrypt 2000
Sort
View
ASIACRYPT
2000
Springer
15 years 8 months ago
Cryptanalysis of the Yi-Lam Hash
David Wagner
ASIACRYPT
2000
Springer
15 years 8 months ago
Attacking and Repairing Batch Verification Schemes
Colin Boyd, Chris Pavlovski
95
Voted
ASIACRYPT
2000
Springer
15 years 8 months ago
Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers
Philip Hawkes, Gregory G. Rose