


default search action
CSS 2014: Lublin, Poland
- Zbigniew Kotulski
, Bogdan Ksiezopolski
, Katarzyna Mazur
:
Cryptography and Security Systems - Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings. Communications in Computer and Information Science 448, Springer 2014, ISBN 978-3-662-44892-2 - Marina Pudovkina
, Alexander Toktarev
:
Numerical Semigroups and Bounds on Impossible Differential Attacks on Generalized Feistel Schemes. 1-11 - Marek Parfieniuk
, Piotr Jankowski:
Encrypting Huffman-Encoded Data by Substituting Pairs of Code Words without Changing the Bit Count of a Pair. 12-22 - Urszula Romanczuk-Polubiec
, Vasyl Ustimenko:
On Multivariate Cryptosystems Based on Polynomially Compressed Maps with Invertible Decomposition. 23-37 - Omar Reyad
, Zbigniew Kotulski
:
Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random Number Generators. 38-48 - Kimmo Halunen, Mirko Sailio
:
Identity-Based Cryptography in Credit Card Payments. 49-58 - Wit Forys, Lukasz Jeda, Piotr Oprocha
:
On a Cipher Based on Pseudo-random Walks on Graphs. 59-73 - Monika Polak, Vasyl Ustimenko:
On LDPC Codes Based on Families of Expanding Graphs of Increasing Girth without Edge-Transitive Automorphism Groups. 74-88 - Jakub Muszynski, Sébastien Varrette, Juan Luis Jiménez Laredo
, Pascal Bouvry
:
Analysis of the Data Flow in the Newscast Protocol for Possible Vulnerabilities. 89-99 - Appala Naidu Tentu, Allam Appa Rao:
Efficient Verifiable Multi-Secret Sharing Based on Y.C.H Scheme. 100-109 - Ferucio Laurentiu Tiplea:
A Lightweight Authentication Protocol for RFID. 110-121 - Kashi Neupane:
Long-Term Secure Two-Round Group Key Establishment from Pairings. 122-130 - Nicolas T. Courtois, Marek Grajek, Rahul Naik:
Optimizing SHA256 in Bitcoin Mining. 131-144 - Marek R. Ogiela, Piotr Sulkowski:
Protocol for Detection of Counterfeit Transactions in Electronic Currency Exchange. 145-152 - Imed El Fray
, Tomasz Hyla, Miroslaw Kurkowski
, Witold Mackow, Jerzy Pejas
:
Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices. 153-165 - Ismail Mansour, Gérard Chalhoub, Pascal Lafourcade
:
Secure Multihop Key Establishment Protocols for Wireless Sensor Networks. 166-177 - Katarzyna Mazur
, Bogdan Ksiezopolski
:
Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-ML. 178-192 - Grzegorz Orynczak, Zbigniew Kotulski
:
Context-Aware Secure Routing Protocol for Real-Time Services. 193-207

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
