Symbolic Protocol Analysis for Diffie-Hellman
Symmetric Boolean Function with Maximum Algebraic Immunity on Odd Number of Variables
Synthesis of Binary k-Stage Machines
Synthesis of Parallel Binary Machines
T-functions revisited: New criteria for bijectivity/transitivity
Tardos fingerprinting is better than we thought
Tatouage Robuste Et Aveugle Dans Le Domaine Des Valeurs Singulieres
Term-based composition of security protocols
Testing D-Sequences for their Randomness
Testing Kak's Conjecture on Binary Reciprocal of Primes and Cryptographic Applications
The $k$-error linear complexity distribution for $2^n$-periodic binary sequences
The Advent of Steganography in Computing Environments
The Algorithm Analysis of E-Commerce Security Issues for Online Payment Transaction System in Banking Technology
The Aryabhata Algorithm Using Least Absolute Remainders
The B-Exponential Map: A Generalization of the Logistic Map, and Its Applications In Generating Pseudo-random Numbers
The Basic Discrete Hilbert Transform with an Information Hiding Application
The BitTorrent Anonymity Marketplace
The block cipher NSABC (public domain)
The Cubic Public-Key Transformation
The Digital Signature Scheme MQQ-SIG