Found: 7
Select item for more details and to access through your institution.
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 1, p. 1, doi. 10.1007/s00145-012-9130-9
- By:
- Publication type:
- Article
A One-Time Stegosystem and Applications to Efficient Covert Communication.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 1, p. 23, doi. 10.1007/s00145-012-9135-4
- By:
- Publication type:
- Article
Concurrent Zero Knowledge, Revisited.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 1, p. 45, doi. 10.1007/s00145-012-9137-2
- By:
- Publication type:
- Article
(Non-)Random Sequences from (Non-)Random Permutations-Analysis of RC4 Stream Cipher.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 1, p. 67, doi. 10.1007/s00145-012-9138-1
- By:
- Publication type:
- Article
A New Interactive Hashing Theorem.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 1, p. 109, doi. 10.1007/s00145-012-9139-0
- By:
- Publication type:
- Article
Security Models and Proof Strategies for Plaintext-Aware Encryption.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 1, p. 139, doi. 10.1007/s00145-012-9141-6
- By:
- Publication type:
- Article
Erratum to: A Comparison of Cryptanalytic Tradeoff Algorithms.
- Published in:
- 2014
- By:
- Publication type:
- Correction notice