Works matching IS 09332790 AND DT 2013 AND VI 26 AND IP 1
Results: 9
Slender-Set Differential Cryptanalysis.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 1, p. 11, doi. 10.1007/s00145-011-9111-4
- By:
- Publication type:
- Article
More Constructions of Lossy and Correlation-Secure Trapdoor Functions.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 1, p. 39, doi. 10.1007/s00145-011-9112-3
- By:
- Publication type:
- Article
Public-Coin Parallel Zero-Knowledge for NP.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 1, p. 1, doi. 10.1007/s00145-011-9110-5
- By:
- Publication type:
- Article
A Single-Key Attack on the Full GOST Block Cipher.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 1, p. 172, doi. 10.1007/s00145-012-9118-5
- By:
- Publication type:
- Article
Input Locality and Hardness Amplification.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 1, p. 144, doi. 10.1007/s00145-011-9117-y
- By:
- Publication type:
- Article
Secure Integration of Asymmetric and Symmetric Encryption Schemes.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 1, p. 80, doi. 10.1007/s00145-011-9114-1
- By:
- Publication type:
- Article
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 1, p. 119, doi. 10.1007/s00145-011-9116-z
- By:
- Publication type:
- Article
Practical Chosen Ciphertext Secure Encryption from Factoring.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 1, p. 102, doi. 10.1007/s00145-011-9115-0
- By:
- Publication type:
- Article
Analysis of an Unconditionally Secure Distributed Oblivious Transfer.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 1, p. 75, doi. 10.1007/s00145-011-9113-2
- By:
- Publication type:
- Article