Found: 4
Select item for more details and to access through your institution.
An Efficient Noninteractive Zero-Knowledge Proof System for NP with General Assumptions.
- Published in:
- Journal of Cryptology, 1998, v. 11, n. 1, p. 1, doi. 10.1007/s001459900032
- By:
- Publication type:
- Article
A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems.
- Published in:
- Journal of Cryptology, 1998, v. 11, n. 1, p. 29, doi. 10.1007/s001459900033
- By:
- Publication type:
- Article
Cryptanalysis of Multiple Modes of Operation.
- Published in:
- Journal of Cryptology, 1998, v. 11, n. 1, p. 45, doi. 10.1007/s001459900034
- By:
- Publication type:
- Article
Attacks on Fast Double Block Length Hash Functions.
- Published in:
- Journal of Cryptology, 1998, v. 11, n. 1, p. 59, doi. 10.1007/s001459900035
- By:
- Publication type:
- Article