|
Search the dblp DataBase
James Hughes:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- James Hughes
A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:176-189 [Conf]
- Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James Hughes, Paul C. Leyland
Factoring Estimates for a 1024-Bit RSA Modulus. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2003, pp:55-74 [Conf]
- Craig Partridge, James Hughes, Jonathan Stone
Performance of Checksums and CRCs over Real Data. [Citation Graph (0, 0)][DBLP] SIGCOMM, 1995, pp:68-76 [Conf]
- Axelle Apvrille, James Hughes, Vincent Girier
Streamed or Detached Triple Integrity for a Time Stamped Secure Storage System. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2002, pp:53-64 [Conf]
- James Hughes, Allen Tannenbaum
Length-Based Attacks for Certain Group Based Encryption Rewriting Systems [Citation Graph (0, 0)][DBLP] CoRR, 2003, v:0, n:, pp:- [Journal]
- Jonathan Stone, Michael Greenwald, Craig Partridge, James Hughes
Performance of checksums and CRC's over real data. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 1998, v:6, n:5, pp:529-543 [Journal]
Characterization Framework and Design Patterns for the Disadvantaged User. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.003secs
|