Tatra Mountains Mathematical Publications
Zoznam článkov
Volume 29, 2004, No. 3
ISSN 1210-3195 (print)
ISSN 1338–9750 (online)
Obsah:
- Berta, I. - Vajda, I.: Limitations of humans when using malicious terminals. (s. 1)
- Bojanić, S. - Caffarena, G. - Petrović, S. - Nieto-Taladriz, O.: Stream cipher cryptanalysis based on the edit-distance: A hardware approach. (s. 17)
- Caballero-Gil, P. - Hernández-Goya, C. - Bruno-Castañeda, C.: Practical design of two-party cryptographic protocols. (s. 31)
- Kozioł, A.: One-time password tree. (s. 49)
- Kucner, J. - Kutyłowski, M.: How to use un-trusty cryptographic devices. (s. 57)
- Licskó, I.: A lower bound of the number of highly nonlinear function. (s. 69)
- Seidel, T. - Socek, D. - Šrámka, M.: Cryptanalysis of video encryption algorithms. (s. 79)
- Tyksiński, T.: Bounds for differential probabilities. (s. 89)
- Dujella, A.: Continued fractions and RSA with small secret exponent. (s. 101)
- Saidak, F.: On the logarithmic derivative of the Euler product. (s. 113)
- Grošek, O. - Šiška, J.: Discrete logarithm problem in GH and XTR scheme. (s. 123)
- Krivoš–Belluš, R.: Formal analysis and parallelism in protocols. (s. 137)
- Wei, W. - Tran Van Trung, . - Magliveras, S. - Hoffman, F.: Cryptographic primitives based on groups of hidden order. (s. 147)
- Strauch, O.: Some modifications of one-time pad cipher. (s. 157)
- Vojvoda, M.: Cryptanalysis of one hash function based on quasigroup. (s. 173)
- Grošek, O. - Miller, M. - Ryan, J.: On non-polynomiality of XOR over $Bbb Z2n$. (s. 183)