Found: 5
Select item for more details and to access through your institution.
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs.
- Published in:
- Journal of Cryptology, 2008, v. 21, n. 3, p. 303, doi. 10.1007/s00145-007-9004-8
- By:
- Publication type:
- Article
Cryptanalysis of the Shpilrain–Ushakov Protocol for Thompson’s Group.
- Published in:
- Journal of Cryptology, 2008, v. 21, n. 3, p. 458, doi. 10.1007/s00145-007-9016-4
- By:
- Publication type:
- Article
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication.
- Published in:
- Journal of Cryptology, 2008, v. 21, n. 3, p. 392, doi. 10.1007/s00145-007-9001-y
- By:
- Publication type:
- Article
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
- Published in:
- Journal of Cryptology, 2008, v. 21, n. 3, p. 350, doi. 10.1007/s00145-007-9006-6
- By:
- Publication type:
- Article
Cryptanalysis of an E0-like Combiner with Memory.
- Published in:
- Journal of Cryptology, 2008, v. 21, n. 3, p. 430, doi. 10.1007/s00145-007-9017-3
- By:
- Publication type:
- Article