Gaussian sampling in lattice based cryptography J Folláth Tatra Mountains Mathematical Publications 60 (1), 1-23, 2014 | 37 | 2014 |
Construction of pseudorandom binary sequences using additive characters over GF (2 k) J Folláth Periodica Mathematica Hungarica 57 (1), 73-81, 2008 | 20 | 2008 |
Construction of pseudorandom binary sequences using additive characters over GF (2 k) II J Folláth Periodica Mathematica Hungarica 60 (2), 127-135, 2010 | 16 | 2010 |
Portable electronic device, system and method for authenticating a document associated with a geographical location A Bérczes, ÉC ÁDÁMKÓ, J Folláth, A Pethõ US Patent App. 13/673,085, 2012 | 12 | 2012 |
On a family of preimage-resistant functions A Bérczes, J Folláth, A Pethő Tatra Mountains Mathematical Publications 47 (1), 1-13, 2010 | 2 | 2010 |
DESignIn asymmetric authentication system J Folláth, A Huszti, A Pethő Proceedings of the 7th ICAI Conference, Eger, 53-61, 2007 | 2 | 2007 |
Kriptográfiai hash függvények és álvéletlenszám generátorok J Folláth | 1 | 2012 |
Notes on A Preimage-Resistant Hash Function J Folláth Tatra Mountains Mathematical Publications 53 (1), 103-117, 2012 | | 2012 |
Információbiztonság és Kriptográfia J Folláth, A Huszti, P Attila Farkas Kempelen Digital Library, 2011 | | 2011 |
Secure Utilisation of Local and Regional Data Assets through Mobile Environments L Aszalós, N Bátfai, L Csirmaz, J Folláth, T Herendi, T Kovács, A Pethő, ... 8th International Conference on Applied Informatics, 265-272, 2010 | | 2010 |
Álvéletlenszámok generálása és szerepük a kriptográfiában J Folláth | | 2006 |