Found: 8
Select item for more details and to access through your institution.
Efficient Slide Attacks.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 3, p. 641, doi. 10.1007/s00145-017-9266-8
- By:
- Publication type:
- Article
Completeness for Symmetric Two-Party Functionalities: Revisited.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 3, p. 671, doi. 10.1007/s00145-017-9267-7
- By:
- Publication type:
- Article
On Constructing One-Way Permutations from Indistinguishability Obfuscation.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 3, p. 698, doi. 10.1007/s00145-017-9268-6
- By:
- Publication type:
- Article
On the Feasibility of Extending Oblivious Transfer.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 3, p. 737, doi. 10.1007/s00145-017-9269-5
- By:
- Publication type:
- Article
Asymptotically Efficient Lattice-Based Digital Signatures.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 3, p. 774, doi. 10.1007/s00145-017-9270-z
- By:
- Publication type:
- Article
Fast Garbling of Circuits Under Standard Assumptions.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 3, p. 798, doi. 10.1007/s00145-017-9271-y
- By:
- Publication type:
- Article
Key-Recovery Attacks on ASASA.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 3, p. 845, doi. 10.1007/s00145-017-9272-x
- By:
- Publication type:
- Article
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 3, p. 885, doi. 10.1007/s00145-017-9273-9
- By:
- Publication type:
- Article