Found: 5
Select item for more details and to access through your institution.
Non-interactive Timestamping in the Bounded-Storage Model.
- Published in:
- Journal of Cryptology, 2009, v. 22, n. 2, p. 189, doi. 10.1007/s00145-008-9035-9
- By:
- Publication type:
- Article
Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography.
- Published in:
- Journal of Cryptology, 2009, v. 22, n. 2, p. 259, doi. 10.1007/s00145-008-9023-0
- By:
- Publication type:
- Article
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures.
- Published in:
- Journal of Cryptology, 2009, v. 22, n. 2, p. 139, doi. 10.1007/s00145-008-9031-0
- By:
- Publication type:
- Article
Multipartite Secret Sharing by Bivariate Interpolation.
- Published in:
- Journal of Cryptology, 2009, v. 22, n. 2, p. 227, doi. 10.1007/s00145-008-9027-9
- By:
- Publication type:
- Article
A Proof of Security of Yao’s Protocol for Two-Party Computation.
- Published in:
- Journal of Cryptology, 2009, v. 22, n. 2, p. 161, doi. 10.1007/s00145-008-9036-8
- By:
- Publication type:
- Article