Found: 4
Select item for more details and to access through your institution.
A Comparison of Cryptanalytic Tradeoff Algorithms.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 4, p. 559, doi. 10.1007/s00145-012-9128-3
- By:
- Publication type:
- Article
A Note on Constant-Round Zero-Knowledge Proofs of Knowledge.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 4, p. 638, doi. 10.1007/s00145-012-9132-7
- By:
- Publication type:
- Article
FlipIt: The Game of 'Stealthy Takeover'.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 4, p. 655, doi. 10.1007/s00145-012-9134-5
- By:
- Publication type:
- Article
Round-Optimal Password-Based Authenticated Key Exchange.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 4, p. 714, doi. 10.1007/s00145-012-9133-6
- By:
- Publication type:
- Article