Found: 11
Select item for more details and to access through your institution.
Security Proofs for Identity-Based Identification and Signature Schemes.
- Published in:
- Journal of Cryptology, 2009, v. 22, n. 1, p. 1, doi. 10.1007/s00145-008-9028-8
- By:
- Publication type:
- Article
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm.
- Published in:
- Journal of Cryptology, 2008, v. 21, n. 4, p. 469, doi. 10.1007/s00145-008-9026-x
- By:
- Publication type:
- Article
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
- Published in:
- Journal of Cryptology, 2008, v. 21, n. 3, p. 350, doi. 10.1007/s00145-007-9006-6
- By:
- Publication type:
- Article
A Note on Negligible Functions.
- Published in:
- Journal of Cryptology, 2002, v. 15, n. 4, p. 271, doi. 10.1007/s00145-002-0116-x
- By:
- Publication type:
- Article
Translucent Cryptography--An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer.
- Published in:
- Journal of Cryptology, 1999, v. 12, n. 2, p. 117, doi. 10.1007/PL00003819
- By:
- Publication type:
- Article
Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation.
- Published in:
- Journal of Cryptology, 1996, v. 9, n. 3, p. 149, doi. 10.1007/s001459900009
- By:
- Publication type:
- Article
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption.
- Published in:
- Journal of Cryptology, 2024, v. 37, n. 4, p. 1, doi. 10.1007/s00145-024-09513-6
- By:
- Publication type:
- Article
Robust Encryption.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 2, p. 307, doi. 10.1007/s00145-017-9258-8
- By:
- Publication type:
- Article
New Proofs for NMAC and HMAC: Security without Collision Resistance.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 4, p. 844, doi. 10.1007/s00145-014-9185-x
- By:
- Publication type:
- Article
Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed?
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 1, p. 29, doi. 10.1007/s00145-013-9167-4
- By:
- Publication type:
- Article
A Characterization of Chameleon Hash Functions and New, Efficient Designs.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 4, p. 799, doi. 10.1007/s00145-013-9155-8
- By:
- Publication type:
- Article