Found: 8
Select item for more details and to access through your institution.
The Hunting of the SNARK.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 4, p. 989, doi. 10.1007/s00145-016-9241-9
- By:
- Publication type:
- Article
Information Theoretical Cryptogenography.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 4, p. 1067, doi. 10.1007/s00145-016-9242-8
- By:
- Publication type:
- Article
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 4, p. 1116, doi. 10.1007/s00145-016-9243-7
- By:
- Publication type:
- Article
Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 4, p. 1157, doi. 10.1007/s00145-016-9245-5
- By:
- Publication type:
- Article
Reproducible Circularly Secure Bit Encryption: Applications and Realizations.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 4, p. 1187, doi. 10.1007/s00145-016-9246-4
- By:
- Publication type:
- Article
Efficient Authentication from Hard Learning Problems.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 4, p. 1238, doi. 10.1007/s00145-016-9247-3
- By:
- Publication type:
- Article
Authenticated Confidential Channel Establishment and the Security of TLS-DHE.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 4, p. 1276, doi. 10.1007/s00145-016-9248-2
- By:
- Publication type:
- Article
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 4, p. 961, doi. 10.1007/s00145-016-9239-3
- By:
- Publication type:
- Article