Found: 6
Select item for more details and to access through your institution.
Breaking the Stream Ciphers F-FCSR-H and F-FCSR-16 in Real Time.
- Published in:
- Journal of Cryptology, 2011, v. 24, n. 3, p. 427, doi. 10.1007/s00145-009-9053-2
- By:
- Publication type:
- Article
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves.
- Published in:
- Journal of Cryptology, 2011, v. 24, n. 3, p. 446, doi. 10.1007/s00145-010-9065-y
- By:
- Publication type:
- Article
Possibility and Impossibility Results for Selective Decommitments.
- Published in:
- Journal of Cryptology, 2011, v. 24, n. 3, p. 470, doi. 10.1007/s00145-010-9066-x
- By:
- Publication type:
- Article
Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs.
- Published in:
- Journal of Cryptology, 2011, v. 24, n. 3, p. 517, doi. 10.1007/s00145-010-9069-7
- By:
- Publication type:
- Article
Short Undeniable Signatures Based on Group Homomorphisms.
- Published in:
- Journal of Cryptology, 2011, v. 24, n. 3, p. 545, doi. 10.1007/s00145-010-9070-1
- By:
- Publication type:
- Article
Tweakable Block Ciphers.
- Published in:
- Journal of Cryptology, 2011, v. 24, n. 3, p. 588, doi. 10.1007/s00145-010-9073-y
- By:
- Publication type:
- Article