Found: 5
Select item for more details and to access through your institution.
Cryptanalysis of Triple Modes of Operation.
- Published in:
- Journal of Cryptology, 1999, v. 12, n. 3, p. 161, doi. 10.1007/s001459900050
- By:
- Publication type:
- Article
Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages.
- Published in:
- Journal of Cryptology, 1999, v. 12, n. 3, p. 197, doi. 10.1007/s001459900053
- By:
- Publication type:
- Article
The Discrete Logarithm Problem on Elliptic Curves of Trace One.
- Published in:
- Journal of Cryptology, 1999, v. 12, n. 3, p. 193, doi. 10.1007/s001459900052
- By:
- Publication type:
- Article
How to Stretch Random Functions: The Security of Protected Counter Sums.
- Published in:
- Journal of Cryptology, 1999, v. 12, n. 3, p. 185, doi. 10.1007/s001459900051
- By:
- Publication type:
- Article
On a Fallacious Bound for Authentication Codes.
- Published in:
- Journal of Cryptology, 1999, v. 12, n. 3, p. 155, doi. 10.1007/s001459900049
- By:
- Publication type:
- Article