Found: 3
Select item for more details and to access through your institution.
Session-Key Generation Using Human Passwords Only.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 3, p. 241, doi. 10.1007/s00145-006-0233-z
- By:
- Publication type:
- Article
Private Computation: k-Connected versus 1-Connected Networks.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 3, p. 341, doi. 10.1007/s00145-005-0329-x
- By:
- Publication type:
- Article
A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 3, p. 359, doi. 10.1007/s00145-005-0345-x
- By:
- Publication type:
- Article