Browse Papers
From IFORS
Contact Us
English
Remember me
Login
Forgot password?
Keyword: cryptography
Found
9 papers
in total
Date Descending
Date Ascending
Title Descending
Title Ascending
Design of improved password authentication and update scheme based on elliptic curve cryptography
2013,
Hafizul Islam SK
Secured password authentication and update of passwords are two essential requirements...
New attacks and security model of the secure flash disk
2013,
Li Zheng
Nowadays, the secure flash disk is the most common secure mobile storage device. Two...
Generation of pseudorandom binary sequences by means of linear feedback shift registers (LFSRs) with dynamic feedback
2013,
Peinado A
In 2002, Mita et al. proposed a pseudorandom bit generator based on a dynamic linear...
Adaptively secure identity‐based broadcast encryption with constant size private keys and ciphertexts from the subgroups
2012,
Hu Yupu
The main challenge in building efficient broadcast systems is to encrypt messages with...
Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography
2012,
Vasyltsov Ihor
We describe a new fault detection method in elliptic curve scalar multiplication...
Experimental Performance of Shared {RSA} Modulus Generation
2002,
Wright R N
Many distributed protocols require the participants to have secret shares of an RSA...
Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems
2011,
Goodrich T
Following in the spirit of data structure and algorithm correctness checking,...
Secure collaborative supply chain planning and inverse optimization – The JELS model
2011,
Pibernik Richard
It is a well‐acknowledged fact that collaboration between different members of...
Secure collaborative supply chain planning and inverse optimization ‐ The JELS model
2011,
Pibernik Richard
It is a well-acknowledged fact that collaboration between different members of a...
Papers per page:
6 Papers
12 Papers
24 Papers
36 Papers
48 Papers