Found: 5
Select item for more details and to access through your institution.
On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 1, p. 1, doi. 10.1007/s00145-009-9050-5
- By:
- Publication type:
- Article
Efficient Cache Attacks on AES, and Countermeasures.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 1, p. 37, doi. 10.1007/s00145-009-9049-y
- By:
- Publication type:
- Article
Cryptanalysis of MD2.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 1, p. 72, doi. 10.1007/s00145-009-9054-1
- By:
- Publication type:
- Article
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 1, p. 91, doi. 10.1007/s00145-009-9051-4
- By:
- Publication type:
- Article
Obfuscation for Cryptographic Purposes.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 1, p. 121, doi. 10.1007/s00145-009-9046-1
- By:
- Publication type:
- Article