Found: 6
Select item for more details and to access through your institution.
A Proof of the Security of Quantum Key Distribution.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 4, p. 381, doi. 10.1007/s00145-005-0011-3
- By:
- Publication type:
- Article
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 4, p. 441, doi. 10.1007/s00145-006-0205-3
- By:
- Publication type:
- Article
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 4, p. 463, doi. 10.1007/s00145-006-0224-0
- By:
- Publication type:
- Article
An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 4, p. 489, doi. 10.1007/s00145-006-0332-x
- By:
- Publication type:
- Article
Completeness in Two-Party Secure Computation: A Computational View.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 4, p. 521, doi. 10.1007/s00145-006-0346-4
- By:
- Publication type:
- Article
Elliptic Curves with Low Embedding Degree.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 4, p. 553, doi. 10.1007/s00145-006-0544-0
- By:
- Publication type:
- Article