Found: 5
Select item for more details and to access through your institution.
Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 4, p. 595, doi. 10.1007/s00145-013-9158-5
- By:
- Publication type:
- Article
Authenticated Adversarial Routing.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 4, p. 636, doi. 10.1007/s00145-013-9157-6
- By:
- Publication type:
- Article
Improved Cryptanalysis of AES-like Permutations.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 4, p. 772, doi. 10.1007/s00145-013-9156-7
- By:
- Publication type:
- Article
A Characterization of Chameleon Hash Functions and New, Efficient Designs.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 4, p. 799, doi. 10.1007/s00145-013-9155-8
- By:
- Publication type:
- Article
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 4, p. 824, doi. 10.1007/s00145-013-9154-9
- By:
- Publication type:
- Article