Found: 6
Select item for more details and to access through your institution.
Another Look at "Provable Security".
- Published in:
- Journal of Cryptology, 2007, v. 20, n. 1, p. 3, doi. 10.1007/s00145-005-0432-z
- By:
- Publication type:
- Article
Scalable Protocols for Authenticated Group Key Exchange.
- Published in:
- Journal of Cryptology, 2007, v. 20, n. 1, p. 85, doi. 10.1007/s00145-006-0361-5
- By:
- Publication type:
- Article
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
- Published in:
- Journal of Cryptology, 2007, v. 20, n. 1, p. 51, doi. 10.1007/s00145-006-0347-3
- By:
- Publication type:
- Article
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication.
- Published in:
- Journal of Cryptology, 2007, v. 20, n. 1, p. 115, doi. 10.1007/s00145-006-0431-8
- By:
- Publication type:
- Article
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring.
- Published in:
- Journal of Cryptology, 2007, v. 20, n. 1, p. 39, doi. 10.1007/s00145-006-0433-6
- By:
- Publication type:
- Article
Editor's Note.
- Published in:
- 2007
- By:
- Publication type:
- Editorial