Works matching IS 09332790 AND DT 2015 AND VI 28 AND IP 2


Results: 6
    1
    2
    3
    4
    5

    Computing on Authenticated Data.

    Published in:
    Journal of Cryptology, 2015, v. 28, n. 2, p. 351, doi. 10.1007/s00145-014-9182-0
    By:
    • Ahn, Jae;
    • Boneh, Dan;
    • Camenisch, Jan;
    • Hohenberger, Susan;
    • Shelat, Abhi;
    • Waters, Brent
    Publication type:
    Article
    6

    New Attacks on IDEA with at Least 6 Rounds.

    Published in:
    Journal of Cryptology, 2015, v. 28, n. 2, p. 209, doi. 10.1007/s00145-013-9162-9
    By:
    • Biham, Eli;
    • Dunkelman, Orr;
    • Keller, Nathan;
    • Shamir, Adi
    Publication type:
    Article