Found: 5
Select item for more details and to access through your institution.
Accelerating Pollard's Rho Algorithm on Finite Fields.
- Published in:
- Journal of Cryptology, 2012, v. 25, n. 2, p. 195, doi. 10.1007/s00145-010-9093-7
- By:
- Publication type:
- Article
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes.
- Published in:
- Journal of Cryptology, 2012, v. 25, n. 2, p. 243, doi. 10.1007/s00145-010-9094-6
- By:
- Publication type:
- Article
A Simple Variant of the Merkle-Damgård Scheme with a Permutation.
- Published in:
- Journal of Cryptology, 2012, v. 25, n. 2, p. 271, doi. 10.1007/s00145-010-9095-5
- By:
- Publication type:
- Article
Multi-Verifier Signatures.
- Published in:
- Journal of Cryptology, 2012, v. 25, n. 2, p. 310, doi. 10.1007/s00145-010-9096-4
- By:
- Publication type:
- Article
The Extended k-tree Algorithm.
- Published in:
- Journal of Cryptology, 2012, v. 25, n. 2, p. 349, doi. 10.1007/s00145-011-9097-y
- By:
- Publication type:
- Article