Cryptographical properties of Ising spin systems Eavesdropping on quantum-cryptographical systems Gauss periods: orders and cryptographical applications Gauss periods: orders and cryptographical applications Some Consequences of Cryptographical Conjectures for S_2^1 and EF Some consequences of cryptographical conjectures for S 1 2 and EF Some Consequences of Cryptographical Conjectures for S 1 2 and EF ☆ Discrete-time chaotic encryption systems. III. Cryptographical analysis Privacy-preserving RFID authentication based on cryptographical encoding Privacy-preserving RFID authentication based on cryptographical encoding