This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013.
... Generalised Cycling Attacks on RSA and Strong RSA Primes ⋆ Marc Gysin and Jennifer Seberry Centre for Computer Security Research ... Generalised Cycling Attacks on RSA and Strong RSA Primes Preliminaries The Carmichael and Omega Function.
... Integrity Primitives, Berlin, Heidelberg, New York. Integrity Primitives for Secure Information Systems, Final RIPE Report of RACE Integrity Primitives Evaluation, RIPE-RACE 1040 (1995) 17. Rivest, R.L.: The MD4 message digest algorithm ...
... Integrity Primitives for Secure Information System, Final Report of RACE integrity primitives evaluation (RIPE-RACE 1040), RIPE Integrity Primitives, LNCS 1007, pp. 226, SpringerVerlag, 1995. 3. E. Biham, How to Decrypt or Even ...
... Integrity primitives for secure information systems. Final Report of RACE Integrity Primitives Evaluation(R1040),RACE, 1995. Ronald L. Rivest. The MD4 message digest algorithm. In Alfred J. Menezes and Scott A. Vanstone, editors ...
Information Security and Privacy: A Guide to Federal and State Law and Compliance
This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*.
... gnu.org/software/grub/manual/multiboot/ multiboot.html Keller, E., Szefer, J., Rexford, J., Lee, R.B.: NoHype: Virtualized cloud infrastructure without the virtualization. In: Proceedings of the 37th Annual International Symposium on ...