On the security of new key exchange protocols based on the triple decomposition problem
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
On the Security of the Cha-Ko-Lee-Han-Cheon Braid Group Public Key Cryptosystem
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
On the Security of the Yi-Tan-Siew Chaos-Based Cipher
On the Security of ``an efficient and complete remote user authentication scheme''
On the Semantics of Purpose Requirements in Privacy Policies
On the Unicity Distance of Stego Key
On the Use of Cellular Automata in Symmetric Cryptography
On Unconditionally Secure Computation with Vanishing Communication Cost
On Vulnerabilities, Constraints and Assumptions
On weakly APN functions and 4-bit S-Boxes
On White-box Cryptography and Obfuscation
One software tool for testing square s-boxes
One-way Hash Function Based on Neural Network
Optimal Iris Fuzzy Sketches
Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures
Optimal symmetric Tardos traitor tracing schemes
Optimization of Bit Plane Combination for Efficient Digital Image Watermarking
Optimization of Memory Usage in Tardos's Fingerprinting Codes