Found: 6
Select item for more details and to access through your institution.
Almost-Everywhere Secure Computation with Edge Corruptions.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 4, p. 745, doi. 10.1007/s00145-013-9176-3
- By:
- Publication type:
- Article
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 4, p. 769, doi. 10.1007/s00145-014-9178-9
- By:
- Publication type:
- Article
Spreading Alerts Quietly and the Subgroup Escape Problem.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 4, p. 796, doi. 10.1007/s00145-014-9181-1
- By:
- Publication type:
- Article
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 4, p. 820, doi. 10.1007/s00145-014-9184-y
- By:
- Publication type:
- Article
New Proofs for NMAC and HMAC: Security without Collision Resistance.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 4, p. 844, doi. 10.1007/s00145-014-9185-x
- By:
- Publication type:
- Article
Collision Attack on Grindahl.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 4, p. 879, doi. 10.1007/s00145-014-9186-9
- By:
- Publication type:
- Article