Found: 10
Select item for more details and to access through your institution.
Improved Single-Key Attacks on 8-Round AES-192 and AES-256.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 3, p. 397, doi. 10.1007/s00145-013-9159-4
- By:
- Publication type:
- Article
GNUC: A New Universal Composability Framework.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 3, p. 423, doi. 10.1007/s00145-013-9160-y
- By:
- Publication type:
- Article
On the Complexity of Constructing Pseudorandom Functions (Especially when They Don't Exist).
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 3, p. 509, doi. 10.1007/s00145-013-9161-x
- By:
- Publication type:
- Article
How to Achieve Perfect Simulation and a Complete Problem for Non-interactive Perfect Zero-Knowledge.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 3, p. 533, doi. 10.1007/s00145-013-9165-6
- By:
- Publication type:
- Article
Protocols for Multiparty Coin Toss with a Dishonest Majority.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 3, p. 551, doi. 10.1007/s00145-013-9168-3
- By:
- Publication type:
- Article
Polynomial-Time Solutions of Computational Problems in Noncommutative-Algebraic Cryptography.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 3, p. 601, doi. 10.1007/s00145-013-9170-9
- By:
- Publication type:
- Article
Provable Unlinkability Against Traffic Analysis with Low Message Overhead.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 3, p. 623, doi. 10.1007/s00145-013-9171-8
- By:
- Publication type:
- Article
Tight Security for Signature Schemes Without Random Oracles.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 3, p. 641, doi. 10.1007/s00145-013-9173-6
- By:
- Publication type:
- Article
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 3, p. 671, doi. 10.1007/s00145-013-9174-5
- By:
- Publication type:
- Article
Reflection Cryptanalysis of PRINCE-Like Ciphers.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 3, p. 718, doi. 10.1007/s00145-013-9175-4
- By:
- Publication type:
- Article