Sami Harari

According to our database1, Sami Harari authored at least 9 papers between 1984 and 2009.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2009
An Id-Based Multi Signature Scheme Using Interval Maps.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

FSS2-Id/A Fast Safe Identity-Based Multi Signature Scheme.
Proceedings of the Third International Conference on Network and System Security, 2009

Weakness on Cryptographic Schemes Based on Chained Codes.
Proceedings of the Third International Conference on Network and System Security, 2009

2006
Hidden Field Equations Cryptosystem Performances.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2004
Generalized Boolean Bent Functions.
Proceedings of the Progress in Cryptology, 2004

1997
HCC: A Hash Function Using Error Correcting Codes.
Proceedings of the Cryptography and Coding, 1997

1990
A correlation cryptographic scheme.
Proceedings of the EUROCODE '90, 1990

1988
A new authentication algorithm.
Proceedings of the Coding Theory and Applications, 1988

1984
Non-Linear Non-Commutative Functions for Data Integrity.
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984


  Loading...