Tatra Mountains Mathematical Publications
Article List
Volume 47, 2010, No. 3
ISSN 1210-3195 (print)
ISSN 1338–9750 (online)
Content:
- Bérczes, A. - Folláth, J. - Pethő, A.: On a family of preimage-resistant functions. (p. 1)
- Muñiz, M. - Steinwandt, R.: Security of signature schemes in the presence of key-dependent messages. (p. 15)
- Jacobson, Jr., M. - Scheidler, R. - Stein, A.: Cryptographic aspects of real hyperelliptic curves. (p. 31)
- Mikuš, M. - Savicky, P.: Remarks on Gödel's code as a hash function. (p. 67)
- Novotný, M.: Formal analysis of security protocols for wireless sensor networks. (p. 81)
- Oliynykov, R. - Gorbenko, I. - Dolgov, V. - Ruzhentsev, V.: Results of Ukrainian national public cryptographic competition. (p. 99)
- Rjaško, M.: On chosen target forced prefix preimage resistance. (p. 115)
- Csirmaz, L.: Corrigendum to Secret sharing on infinite graphs. (p. 137)