Found: 6
Select item for more details and to access through your institution.
Enhanced Public Key Security for the McEliece Cryptosystem.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 1, p. 1, doi. 10.1007/s00145-014-9187-8
- By:
- Publication type:
- Article
Fast Cryptography in Genus 2.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 1, p. 28, doi. 10.1007/s00145-014-9188-7
- By:
- Publication type:
- Article
How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 1, p. 61, doi. 10.1007/s00145-014-9189-6
- By:
- Publication type:
- Article
Efficient Set Intersection with Simulation-Based Security.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 1, p. 115, doi. 10.1007/s00145-014-9190-0
- By:
- Publication type:
- Article
Concurrent Knowledge Extraction in Public-Key Models.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 1, p. 156, doi. 10.1007/s00145-014-9191-z
- By:
- Publication type:
- Article
Breaking RSA May Be As Difficult As Factoring.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 1, p. 220, doi. 10.1007/s00145-014-9192-y
- By:
- Publication type:
- Article