Found: 8
Select item for more details and to access through your institution.
Robust Encryption.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 2, p. 307, doi. 10.1007/s00145-017-9258-8
- By:
- Publication type:
- Article
Multivariate High-Order Attacks of Shuffled Tables Recomputation.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 2, p. 351, doi. 10.1007/s00145-017-9259-7
- By:
- Publication type:
- Article
Practical Cryptanalysis of Bluetooth Encryption with Condition Masking.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 2, p. 394, doi. 10.1007/s00145-017-9260-1
- By:
- Publication type:
- Article
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 2, p. 434, doi. 10.1007/s00145-017-9261-0
- By:
- Publication type:
- Article
Deterministic Encryption with the Thorp Shuffle.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 2, p. 521, doi. 10.1007/s00145-017-9262-z
- By:
- Publication type:
- Article
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 2, p. 537, doi. 10.1007/s00145-017-9263-y
- By:
- Publication type:
- Article
Characterization of Secure Multiparty Computation Without Broadcast.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 2, p. 587, doi. 10.1007/s00145-017-9264-x
- By:
- Publication type:
- Article
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 2, p. 610, doi. 10.1007/s00145-017-9265-9
- By:
- Publication type:
- Article