Found: 6
Select item for more details and to access through your institution.
Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 2, p. 240, doi. 10.1007/s00145-013-9163-8
- By:
- Publication type:
- Article
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 2, p. 257, doi. 10.1007/s00145-013-9166-5
- By:
- Publication type:
- Article
From Non-adaptive to Adaptive Pseudorandom Functions.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 2, p. 297, doi. 10.1007/s00145-013-9169-2
- By:
- Publication type:
- Article
Computing on Authenticated Data.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 2, p. 351, doi. 10.1007/s00145-014-9182-0
- By:
- Publication type:
- Article
New Attacks on IDEA with at Least 6 Rounds.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 2, p. 209, doi. 10.1007/s00145-013-9162-9
- By:
- Publication type:
- Article
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 2, p. 312, doi. 10.1007/s00145-014-9177-x
- By:
- Publication type:
- Article