Found: 6
Select item for more details and to access through your institution.
Improved Practical Attacks on Round-Reduced Keccak.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 2, p. 183, doi. 10.1007/s00145-012-9142-5
- By:
- Publication type:
- Article
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 2, p. 210, doi. 10.1007/s00145-012-9143-4
- By:
- Publication type:
- Article
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 2, p. 248, doi. 10.1007/s00145-012-9144-3
- By:
- Publication type:
- Article
On the Amortized Complexity of Zero-Knowledge Protocols.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 2, p. 284, doi. 10.1007/s00145-013-9145-x
- By:
- Publication type:
- Article
On Strong Simulation and Composable Point Obfuscation.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 2, p. 317, doi. 10.1007/s00145-013-9146-9
- By:
- Publication type:
- Article
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 2, p. 358, doi. 10.1007/s00145-013-9147-8
- By:
- Publication type:
- Article