Tatra Mountains Mathematical Publications
Article List
Volume 33, 2006, No. 1
ISSN 1210-3195 (print)
ISSN 1338–9750 (online)
Content:
- Byrka, J.: Efficient user removal in broadcast channel with symmetric encryption. (p. 1)
- Fibíková, L.: Random oracle model and analysis of primitives of a cryptographic scheme. (p. 15)
- Gogolewski, M. - Kutyłowski, M. - L uczak, T.: Distributed time-stamping with boomerang onions. (p. 31)
- Gołofit, K.: Efficient hardware implementation of elliptic curve cryptosystems. (p. 41)
- Grošek, O. - Magliveras, S. - Ťapuška, J. - Wei, W.: Is Rijndael really independent of the field polynomial?. (p. 51)
- Grudka, A. - Wójcik, A.: Non-threshold quantum information splitting scheme. (p. 71)
- Lange, T.: A note on López-Dahab coordinates. (p. 75)
- Hofheinz, D. - Müller-Quade, J. - Steinwandt, R.: On IND-CCA security modeling in cryptographic protocols. (p. 83)
- Nowak, K.: Checking normality of Boolean functions. (p. 99)
- Ren, M.: Efficiency considerations in unconditionally secure communication by public discussion. (p. 113)
- Serweciński, M.: Classification of Boolean functions with respect to linear equivalence. (p. 123)
- Birget, J. - Magliveras, S. - Sramka, M.: On public-key cryptosystems based on combinatorial group theory. (p. 137)
- González Vasco, M. - Steinwandt, R.: Chosen ciphertext attacks as common vulnerability of some group- and polynomial-based encryption schemes. (p. 149)
- Čanda, V. - Tran Van Trung, .: A new mode of using all-or-nothing transforms. (p. 159)
- Gomułkiewicz, M. - Kutyłowski, M. - Wlaź, P.: Fault cryptanalysis for breaking A5/1. (p. 169)
- Klonowski, M. - Kutyłowski, M. - Lauks, A. - Zagórski, F.: Universal re-encryption of signatures and controlling anonymous information flow. (p. 179)
- Grześkowiak, M.: Analysis of algorithms of generating key parameters for the XTR cryptosystems. (p. 189)
- Frey, G.: On the relation between Brauer groups and discrete logarithms. (p. 199)