Found: 11
Select item for more details and to access through your institution.
Classical Leakage Resilience from Fault-Tolerant Quantum Computation.
- Published in:
- Journal of Cryptology, 2019, v. 32, n. 4, p. 1071, doi. 10.1007/s00145-019-09310-6
- By:
- Publication type:
- Article
White-Box Cryptography: Don't Forget About Grey-Box Attacks.
- Published in:
- Journal of Cryptology, 2019, v. 32, n. 4, p. 1095, doi. 10.1007/s00145-019-09315-1
- By:
- Publication type:
- Article
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model.
- Published in:
- Journal of Cryptology, 2019, v. 32, n. 4, p. 1144, doi. 10.1007/s00145-019-09321-3
- By:
- Publication type:
- Article
What Security Can We Achieve Within 4 Rounds?
- Published in:
- Journal of Cryptology, 2019, v. 32, n. 4, p. 1200, doi. 10.1007/s00145-019-09323-1
- By:
- Publication type:
- Article
Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version.
- Published in:
- Journal of Cryptology, 2019, v. 32, n. 4, p. 1263, doi. 10.1007/s00145-018-9277-0
- By:
- Publication type:
- Article
Updating Key Size Estimations for Pairings.
- Published in:
- Journal of Cryptology, 2019, v. 32, n. 4, p. 1298, doi. 10.1007/s00145-018-9280-5
- By:
- Publication type:
- Article
Small CRT-Exponent RSA Revisited.
- Published in:
- Journal of Cryptology, 2019, v. 32, n. 4, p. 1337, doi. 10.1007/s00145-018-9282-3
- By:
- Publication type:
- Article
Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64.
- Published in:
- Journal of Cryptology, 2019, v. 32, n. 4, p. 1383, doi. 10.1007/s00145-018-9285-0
- By:
- Publication type:
- Article
Cryptanalysis of NORX v2.0.
- Published in:
- Journal of Cryptology, 2019, v. 32, n. 4, p. 1423, doi. 10.1007/s00145-018-9297-9
- By:
- Publication type:
- Article
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications.
- Published in:
- Journal of Cryptology, 2019, v. 32, n. 4, p. 1448, doi. 10.1007/s00145-018-9303-2
- By:
- Publication type:
- Article
Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption.
- Published in:
- Journal of Cryptology, 2019, v. 32, n. 4, p. 1491, doi. 10.1007/s00145-018-9305-0
- By:
- Publication type:
- Article