Found: 8
Select item for more details and to access through your institution.
New Second-Preimage Attacks on Hash Functions.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 4, p. 657, doi. 10.1007/s00145-015-9206-4
- By:
- Publication type:
- Article
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 4, p. 697, doi. 10.1007/s00145-015-9207-3
- By:
- Publication type:
- Article
Unconditionally Anonymous Ring and Mesh Signatures.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 4, p. 729, doi. 10.1007/s00145-015-9208-2
- By:
- Publication type:
- Article
Bug Attacks.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 4, p. 775, doi. 10.1007/s00145-015-9209-1
- By:
- Publication type:
- Article
The $$\mathbb {Q}$$ -curve Construction for Endomorphism-Accelerated Elliptic Curves.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 4, p. 806, doi. 10.1007/s00145-015-9210-8
- By:
- Publication type:
- Article
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 4, p. 833, doi. 10.1007/s00145-015-9211-7
- By:
- Publication type:
- Article
Toward a Game Theoretic View of Secure Computation.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 4, p. 879, doi. 10.1007/s00145-015-9212-6
- By:
- Publication type:
- Article
Cryptanalysis of Full RIPEMD-128.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 4, p. 927, doi. 10.1007/s00145-015-9213-5
- By:
- Publication type:
- Article