T-functions revisited: New criteria for bijectivity/transitivity
Tardos fingerprinting is better than we thought
Tatouage Robuste Et Aveugle Dans Le Domaine Des Valeurs Singulieres
Term-based composition of security protocols
Testing D-Sequences for their Randomness
Testing Kak's Conjecture on Binary Reciprocal of Primes and Cryptographic Applications
The $k$-error linear complexity distribution for $2^n$-periodic binary sequences
The Advent of Steganography in Computing Environments
The Algorithm Analysis of E-Commerce Security Issues for Online Payment Transaction System in Banking Technology
The Aryabhata Algorithm Using Least Absolute Remainders
The B-Exponential Map: A Generalization of the Logistic Map, and Its Applications In Generating Pseudo-random Numbers
The Basic Discrete Hilbert Transform with an Information Hiding Application
The BitTorrent Anonymity Marketplace
The block cipher NSABC (public domain)
The Cubic Public-Key Transformation
The Digital Signature Scheme MQQ-SIG
The Discrete Hilbert Transform for Non-Periodic Signals
The discrete logarithm problem in the group of non-singular circulant matrices
The E-net model for the Risk Analysis and Assessment System for the Information Security of Communication and Information Systems ("Defining" Subsystem)
The Effective Key Length of Watermarking Schemes