Found: 5
Select item for more details and to access through your institution.
The RSA Group is Pseudo-Free.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 2, p. 169, doi. 10.1007/s00145-009-9042-5
- By:
- Publication type:
- Article
The TLS Handshake Protocol: A Modular Analysis.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 2, p. 187, doi. 10.1007/s00145-009-9052-3
- By:
- Publication type:
- Article
A Taxonomy of Pairing-Friendly Elliptic Curves.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 2, p. 224, doi. 10.1007/s00145-009-9048-z
- By:
- Publication type:
- Article
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 2, p. 281, doi. 10.1007/s00145-009-9040-7
- By:
- Publication type:
- Article
How Should We Solve Search Problems Privately?
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 2, p. 344, doi. 10.1007/s00145-008-9032-z
- By:
- Publication type:
- Article