×

Found 9 Documents (Results 1–9)

Accountable ciphertext-policy attribute-based encryption scheme supporting public verifiability and nonrepudiation. (English) Zbl 1381.94109

Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 3-18 (2016).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Word oriented cascade jump \(\sigma \)-LFSR. (English) Zbl 1273.94363

Bras-Amorós, Maria (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 18th international symposium, AAECC-18, Tarragona, Sapin, June 8–12, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02180-0/pbk). Lecture Notes in Computer Science 5527, 127-136 (2009).
MSC:  94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

Reducible polynomial over \(\mathbb{F}_{2}\) constructed by trinomial \(\sigma \)-LFSR. (English) Zbl 1237.94105

Yung, Moti (ed.) et al., Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). Lecture Notes in Computer Science 5487, 192-200 (2009).
MSC:  94A60 11T71 94A55
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software