Tatra Mountains Mathematical Publications
Article List
Volume 29, 2004, No. 3
ISSN 1210-3195 (print)
ISSN 1338–9750 (online)
Content:
- Berta, I. - Vajda, I.: Limitations of humans when using malicious terminals. (p. 1)
- Bojanić, S. - Caffarena, G. - Petrović, S. - Nieto-Taladriz, O.: Stream cipher cryptanalysis based on the edit-distance: A hardware approach. (p. 17)
- Caballero-Gil, P. - Hernández-Goya, C. - Bruno-Castañeda, C.: Practical design of two-party cryptographic protocols. (p. 31)
- Kozioł, A.: One-time password tree. (p. 49)
- Kucner, J. - Kutyłowski, M.: How to use un-trusty cryptographic devices. (p. 57)
- Licskó, I.: A lower bound of the number of highly nonlinear function. (p. 69)
- Seidel, T. - Socek, D. - Šrámka, M.: Cryptanalysis of video encryption algorithms. (p. 79)
- Tyksiński, T.: Bounds for differential probabilities. (p. 89)
- Dujella, A.: Continued fractions and RSA with small secret exponent. (p. 101)
- Saidak, F.: On the logarithmic derivative of the Euler product. (p. 113)
- Grošek, O. - Šiška, J.: Discrete logarithm problem in GH and XTR scheme. (p. 123)
- Krivoš–Belluš, R.: Formal analysis and parallelism in protocols. (p. 137)
- Wei, W. - Tran Van Trung, . - Magliveras, S. - Hoffman, F.: Cryptographic primitives based on groups of hidden order. (p. 147)
- Strauch, O.: Some modifications of one-time pad cipher. (p. 157)
- Vojvoda, M.: Cryptanalysis of one hash function based on quasigroup. (p. 173)
- Grošek, O. - Miller, M. - Ryan, J.: On non-polynomiality of XOR over $Bbb Z2n$. (p. 183)