Found: 5
Select item for more details and to access through your institution.
Security Proofs for Identity-Based Identification and Signature Schemes.
- Published in:
- Journal of Cryptology, 2009, v. 22, n. 1, p. 1, doi. 10.1007/s00145-008-9028-8
- By:
- Publication type:
- Article
A Public Key Cryptosystem Based on Non-abelian Finite Groups.
- Published in:
- Journal of Cryptology, 2009, v. 22, n. 1, p. 62, doi. 10.1007/s00145-008-9033-y
- By:
- Publication type:
- Article
Chernoff-Type Direct Product Theorems.
- Published in:
- Journal of Cryptology, 2009, v. 22, n. 1, p. 75, doi. 10.1007/s00145-008-9029-7
- By:
- Publication type:
- Article
Cryptographic Hash Functions from Expander Graphs.
- Published in:
- Journal of Cryptology, 2009, v. 22, n. 1, p. 93, doi. 10.1007/s00145-007-9002-x
- By:
- Publication type:
- Article
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles.
- Published in:
- Journal of Cryptology, 2009, v. 22, n. 1, p. 114, doi. 10.1007/s00145-007-9011-9
- By:
- Publication type:
- Article