Found: 6
Select item for more details and to access through your institution.
Robust Multi-Property Combiners for Hash Functions.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 3, p. 397, doi. 10.1007/s00145-013-9148-7
- By:
- Publication type:
- Article
Key-Dependent Message Security: Generic Amplification and Completeness.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 3, p. 429, doi. 10.1007/s00145-013-9149-6
- By:
- Publication type:
- Article
Rotational Rebound Attacks on Reduced Skein.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 3, p. 452, doi. 10.1007/s00145-013-9150-0
- By:
- Publication type:
- Article
On Best-Possible Obfuscation.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 3, p. 480, doi. 10.1007/s00145-013-9151-z
- By:
- Publication type:
- Article
Cryptography in the Multi-string Model.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 3, p. 506, doi. 10.1007/s00145-013-9152-y
- By:
- Publication type:
- Article
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 3, p. 544, doi. 10.1007/s00145-013-9153-x
- By:
- Publication type:
- Article