Found: 4

Select item for more details and to access through your institution.

  • Polynomial Runtime and Composability.

    Published in:
    Journal of Cryptology, 2013, v. 26, n. 3, p. 375, doi. 10.1007/s00145-012-9127-4
    By:
    • Hofheinz, Dennis;
    • Unruh, Dominique;
    • Müller-Quade, Jörn
    Publication type:
    Article
  • Compact Proofs of Retrievability.

    Published in:
    Journal of Cryptology, 2013, v. 26, n. 3, p. 442, doi. 10.1007/s00145-012-9129-2
    By:
    • Shacham, Hovav;
    • Waters, Brent
    Publication type:
    Article
  • Enhancements of Trapdoor Permutations.

    Published in:
    Journal of Cryptology, 2013, v. 26, n. 3, p. 484, doi. 10.1007/s00145-012-9131-8
    By:
    • Goldreich, Oded;
    • Rothblum, Ron
    Publication type:
    Article
  • Fully Leakage-Resilient Signatures.

    Published in:
    Journal of Cryptology, 2013, v. 26, n. 3, p. 513, doi. 10.1007/s00145-012-9136-3
    By:
    • Boyle, Elette;
    • Segev, Gil;
    • Wichs, Daniel
    Publication type:
    Article