Found: 6
Select item for more details and to access through your institution.
Slidex Attacks on the Even-Mansour Encryption Scheme.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 1, p. 1, doi. 10.1007/s00145-013-9164-7
- By:
- Publication type:
- Article
Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed?
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 1, p. 29, doi. 10.1007/s00145-013-9167-4
- By:
- Publication type:
- Article
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 1, p. 49, doi. 10.1007/s00145-013-9172-7
- By:
- Publication type:
- Article
Cryptanalysis of SHA-0 and Reduced SHA-1.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 1, p. 110, doi. 10.1007/s00145-014-9179-8
- By:
- Publication type:
- Article
Quantum Private Information Retrieval has Linear Communication Complexity.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 1, p. 161, doi. 10.1007/s00145-014-9180-2
- By:
- Publication type:
- Article
Confined Guessing: New Signatures From Standard Assumptions.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 1, p. 176, doi. 10.1007/s00145-014-9183-z
- By:
- Publication type:
- Article