題名 | 作者 | 日期 |
A Specifiable-Verifier Group-Oriented Threshold Signature Scheme Based on the Elliptic Curve Cryptosystem | Chen, Tzer-Shyong; Huang, Gwo-Shiuan; Chung, Yu-Fang; Chang, Nien-Tzu | 2006-10-16T04:01:21Z |
A copyright protection technique by using hybrid domains | Huang, Larry; Jan, Jinn-Ke | 2006-10-16T01:42:13Z |
Java Card Cryptography Design | Tseng, Shau-Yin; Lin, Hui-Ching | 2006-10-16T01:42:44Z |
The Design of Math Core in CPLD for the AES Application | Jing, M.H.; Chen, Y.H.; Hsu, C. H. | 2006-10-16T01:44:01Z |
Enhanced Authentication Key Agreement Protocol | Hwang, Ren-Junn; Shiau, Sheng-Hua; Lin, Kai-Jun | 2006-10-16T03:23:02Z |
An Efficient MAKEP for Wireless Network | Yangy, Chou-Chen; Hwangz, Min-Shiang; Liy, Jian-Wei; Chang, Ting-Yi | 2006-10-16T02:06:20Z |
Cryptanalysis and improvement of an improved Identity-Based key exchange protocol | Tseng, Yu-Mim; Jan, Jinn-Ke; Wang, Ching-Hung | 2006-10-16T04:00:56Z |
A Variant of AES against Square Attack | Wang, Wei-Chuan; Chang, Jen-Chun; Chen, Rong-Jaye | 2006-10-16T04:00:36Z |
Browser Spoofing | Wu, Yongdong; Sheng, Xu Chang; Ma Di | 2006-10-16T03:29:00Z |
Dynamic Triple-DES | Lin, Chu-Hsing; Yeh, Yi-Shiung; Lee, Chen-Yu | 2006-10-16T04:01:34Z |