Follow
János Folláth
János Folláth
Verified email at inf.unideb.hu
Title
Cited by
Cited by
Year
Gaussian sampling in lattice based cryptography
J Folláth
Tatra Mountains Mathematical Publications 60 (1), 1-23, 2014
372014
Construction of pseudorandom binary sequences using additive characters over GF (2 k)
J Folláth
Periodica Mathematica Hungarica 57 (1), 73-81, 2008
202008
Construction of pseudorandom binary sequences using additive characters over GF (2 k) II
J Folláth
Periodica Mathematica Hungarica 60 (2), 127-135, 2010
162010
Portable electronic device, system and method for authenticating a document associated with a geographical location
A Bérczes, ÉC ÁDÁMKÓ, J Folláth, A Pethõ
US Patent App. 13/673,085, 2012
122012
On a family of preimage-resistant functions
A Bérczes, J Folláth, A Pethő
Tatra Mountains Mathematical Publications 47 (1), 1-13, 2010
22010
DESignIn asymmetric authentication system
J Folláth, A Huszti, A Pethő
Proceedings of the 7th ICAI Conference, Eger, 53-61, 2007
22007
Kriptográfiai hash függvények és álvéletlenszám generátorok
J Folláth
12012
Notes on A Preimage-Resistant Hash Function
J Folláth
Tatra Mountains Mathematical Publications 53 (1), 103-117, 2012
2012
Információbiztonság és Kriptográfia
J Folláth, A Huszti, P Attila
Farkas Kempelen Digital Library, 2011
2011
Secure Utilisation of Local and Regional Data Assets through Mobile Environments
L Aszalós, N Bátfai, L Csirmaz, J Folláth, T Herendi, T Kovács, A Pethő, ...
8th International Conference on Applied Informatics, 265-272, 2010
2010
Álvéletlenszámok generálása és szerepük a kriptográfiában
J Folláth
2006
The system can't perform the operation now. Try again later.
Articles 1–11