Found: 5
Select item for more details and to access through your institution.
Secure Computation of the Median (and Other Elements of Specified Ranks).
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 3, p. 373, doi. 10.1007/s00145-010-9059-9
- By:
- Publication type:
- Article
Parallel and Concurrent Security of the HB and HB<sup>+</sup> Protocols.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 3, p. 402, doi. 10.1007/s00145-010-9061-2
- By:
- Publication type:
- Article
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 3, p. 422, doi. 10.1007/s00145-008-9034-x
- By:
- Publication type:
- Article
Discrete Logarithm Problems with Auxiliary Inputs.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 3, p. 457, doi. 10.1007/s00145-009-9047-0
- By:
- Publication type:
- Article
On the Efficient Generation of Prime-Order Elliptic Curves.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 3, p. 477, doi. 10.1007/s00145-009-9037-2
- By:
- Publication type:
- Article