An implementation for a fast public-key cryptosystem G. B. AgnewR. C. MullinS. A. Vanstone OriginalPaper Pages: 63 - 79
Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol Klaus GaarderEinar Snekkenes OriginalPaper Pages: 81 - 98
CRYPTOPOST™ A cryptographic application to mail processing José Pastor OriginalPaper Pages: 137 - 146