Related-key rectangle attack on 36 rounds of the XTEA block cipher Jiqiang Lu Regular Contribution 02 July 2008 Pages: 1 - 11
Bipartite modular multiplication with twice the bit-length of multipliers Masayuki YoshinoKatsuyuki OkeyaCamille Vuillaume Regular Contribution 05 July 2008 Pages: 13 - 23
Large-scale network intrusion detection based on distributed learning algorithm Daxin TianYanheng LiuYang Xiang Regular Contribution 14 November 2008 Pages: 25 - 35
Conference key agreement protocol with non-interactive fault-tolerance over broadcast network Jiin-Chiou ChengChi-Sung Laih Regular Contribution 16 September 2008 Pages: 37 - 48
Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions Atefeh MashatanDouglas R. Stinson Regular Contribution 30 September 2008 Pages: 49 - 60
Privacy-preserving revocation checking M. NarasimhaJ. SolisG. Tsudik Regular Contribution 16 September 2008 Pages: 61 - 75