11 | -- | 24 | Tomasz Bilski, Krzysztof Bucholc, Anna Grocholewska-Czurylo, Janusz Stoklosa. Parameterized Hash Functions |
25 | -- | 35 | Mateusz Buczek. Attacks on StreamHash 2 |
37 | -- | 53 | Sébastien Varrette, Jakub Muszynski, Pascal Bouvry. Hash function generation by means of Gene Expression Programming |
55 | -- | 64 | Renata Kawa, Mieczyslaw Kula. A Remark on Hierarchical Threshold Secret Sharing |
65 | -- | 74 | Vasyl Ustimenko, Aneta Wróblewska. Dynamical systems as the main instrument for the constructions of new quadratic families and their usage in cryptography |
75 | -- | 87 | Mariusz Borowski, Marek Lesniewicz, Robert Wicik, Marcin Grzonkowski. Generation of random keys for cryptographic systems |
89 | -- | 106 | Urszula Romanczuk, Vasyl Ustimenko. On the family of cubical multivariate cryptosystems based on the algebraic graph over finite commutative rings of characteristic 2 |
107 | -- | 119 | Monika Polak, Vasyl Ustimenko. LDPC Codes Based on Algebraic Graphs |
121 | -- | 139 | Ashraf M. Emam, Mahmoud M. Ouf. Performance Evaluation of Different Universal Steganalysis Techniques in JPG Files |