Found: 8
Select item for more details and to access through your institution.
Dynamic Traitor Tracing.
- Published in:
- Journal of Cryptology, 2000, v. 13, n. 3, p. 211
- By:
- Publication type:
- Article
Attacks on Block Ciphers of Low Algebraic Degree.
- Published in:
- Journal of Cryptology, 2000, v. 13, n. 3, p. 197
- By:
- Publication type:
- Article
Complexity Bounds on General Hard-Core Predicates.
- Published in:
- Journal of Cryptology, 2000, v. 13, n. 3, p. 177
- By:
- Publication type:
- Article
Security Arguments for Digital Signatures and Blind Signatures.
- Published in:
- Journal of Cryptology, 2000, v. 13, n. 3, p. 361, doi. 10.1007/s001450010003
- By:
- Publication type:
- Article
On Polynomial Approximation of the Discrete Logarithm and the Diffie--Hellman Mapping.
- Published in:
- Journal of Cryptology, 2000, v. 13, n. 3, p. 339, doi. 10.1007/s001450010002
- By:
- Publication type:
- Article
CBC MAC for Real-Time Data Sources.
- Published in:
- Journal of Cryptology, 2000, v. 13, n. 3, p. 315, doi. 10.1007/s001450010009
- By:
- Publication type:
- Article
Maximum Correlation Analysis of Nonlinear Combining Functions in Stream Ciphers.
- Published in:
- Journal of Cryptology, 2000, v. 13, n. 3, p. 301, doi. 10.1007/s001450010007
- By:
- Publication type:
- Article
Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography.
- Published in:
- Journal of Cryptology, 2000, v. 13, n. 3, p. 153
- By:
- Publication type:
- Article