On weakly APN functions and 4-bit S-Boxes
On White-box Cryptography and Obfuscation
One software tool for testing square s-boxes
One-way Hash Function Based on Neural Network
Optimal Iris Fuzzy Sketches
Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures
Optimal symmetric Tardos traitor tracing schemes
Optimization of Bit Plane Combination for Efficient Digital Image Watermarking
Optimization of Memory Usage in Tardos's Fingerprinting Codes
Optimized Image Steganalysis through Feature Selection using MBEGA
Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks
Optimizing One Fair Document Exchange Protocol
Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks
Outflanking and securely using the PIN/TAN-System
Outrepasser les limites des techniques classiques de Prise d'Empreintes grace aux Reseaux de Neurones
Overview: Main Fundamentals for Steganography