Found: 5
Select item for more details and to access through your institution.
Efficient Set Operations in the Presence of Malicious Adversaries.
- Published in:
- Journal of Cryptology, 2012, v. 25, n. 3, p. 383, doi. 10.1007/s00145-011-9098-x
- By:
- Publication type:
- Article
Ideal Multipartite Secret Sharing Schemes.
- Published in:
- Journal of Cryptology, 2012, v. 25, n. 3, p. 434, doi. 10.1007/s00145-011-9101-6
- By:
- Publication type:
- Article
Perfectly Balanced Boolean Functions and Golić Conjecture.
- Published in:
- Journal of Cryptology, 2012, v. 25, n. 3, p. 464, doi. 10.1007/s00145-011-9100-7
- By:
- Publication type:
- Article
Programmable Hash Functions and Their Applications.
- Published in:
- Journal of Cryptology, 2012, v. 25, n. 3, p. 484, doi. 10.1007/s00145-011-9102-5
- By:
- Publication type:
- Article
Computational Indistinguishability Between Quantum States and Its Cryptographic Application.
- Published in:
- Journal of Cryptology, 2012, v. 25, n. 3, p. 528, doi. 10.1007/s00145-011-9103-4
- By:
- Publication type:
- Article