To search, Click below search items.
All Published Papers Search Service
Title
A Secure Hash Algorithm with only 8 Folded SHA-1 Steps
Author
Danilo Gligoroski, Smile Markovski, Svein J. Knapskog
Vol. 6 No. 10 pp. 194-205
Keywords
SHA-1, SHA-2, hash, quasigroup folding
Adding MAC Functionality to Edon80
Danilo Gligoroski, Svein J. Knapskog
Vol. 7 No. 1 pp. 194-204
Synchronous stream cipher, MAC, Edon80
A Framework for Predicting Security and Dependability Measures in Real-time
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog
Vol. 7 No. 3 pp. 169-183
Stochastic modeling, integrating security and dependability, security measures, real-time prediction, hidden Markov models
Alternative Data Streams in NTFS ? A Gateway for Subverting Endpoint Security Systems
Nenad Stojanovski, Danilo Gligoroski, Svein J. Knapskog
Vol. 7 No. 12 pp. 71-75
NTFS, Alternative Data Streams, Subversion, Endpoint Security Systems