|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
P. Caballero-Gil, A. Fúster-Sabater, C. Hernández-Goya: Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers /jucs_15_15/graph_based_approach_to |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
J.M. Granado-Criado, M.A. Vega-Rodríguez, J.M. Sánchez-Pérez, J.A. Gómez-Pulido: A Dynamically and Partially Reconfigurable Implementation of the IDEA Algorithm Using FPGAs and Handel-C /jucs_13_3/a_dynamically_and_partially |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
J.Á. Muñoz Naranjo, P. Orduña, A. Gómez-Goiri, D. López-de-Ipiña, L. González Casado: Enabling User Access Control in Energy-constrained Wireless Smart Environments /jucs_19_17/enabling_user_access_control |
|
|
|
|
|
L. Nguyen, R. Safavi-Naini, K. Kurosawa: A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem /jucs_11_6/a_provably_secure_and |
|
|
|
|
|
|
|
|
O. Pérez, Y. Berviller, C. Tanougast, S. Weber: The Use of Runtime Reconfiguration on FPGA Circuits to Increase the Performance of the AES Algorithm Implementation /jucs_13_3/the_use_of_runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Y. Wang, J. Wang, S.-F. Sun, J.K. Liu, W. Susilo, J. Baek, I. You, X. Chen: Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption /jucs_25_3/towards_multi_user_searchable |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|