Counting binary functions with certain cryptographic properties Sheelagh Lloyd OriginalPaper Pages: 107 - 131
Some remarks on the security of the identification scheme based on permuted kernels Jean Georgiades OriginalPaper Pages: 133 - 137
A cubic RSA code equivalent to factorization J. H. LoxtonDavid S. P. KhooJennifer Seberry OriginalPaper Pages: 139 - 150