Found: 18
Select item for more details and to access through your institution.
Multi-theorem Preprocessing NIZKs from Lattices.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 619, doi. 10.1007/s00145-019-09324-0
- By:
- Publication type:
- Article
Blockcipher-Based Authenticated Encryption: How Small Can We Go?
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 703, doi. 10.1007/s00145-019-09325-z
- By:
- Publication type:
- Article
Generic Attacks on Hash Combiners.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 742, doi. 10.1007/s00145-019-09328-w
- By:
- Publication type:
- Article
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 824, doi. 10.1007/s00145-019-09330-2
- By:
- Publication type:
- Article
Cryptanalytic Time–Memory–Data Trade-offs for FX-Constructions and the Affine Equivalence Problem.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 874, doi. 10.1007/s00145-019-09332-0
- By:
- Publication type:
- Article
A Practical Forgery Attack on Lilliput-AE.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 910, doi. 10.1007/s00145-019-09333-z
- By:
- Publication type:
- Article
The Communication Complexity of Private Simultaneous Messages, Revisited.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 917, doi. 10.1007/s00145-019-09334-y
- By:
- Publication type:
- Article
Compact Adaptively Secure ABE for NC1 from k-Lin.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 954, doi. 10.1007/s00145-019-09335-x
- By:
- Publication type:
- Article
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 1003, doi. 10.1007/s00145-019-09336-w
- By:
- Publication type:
- Article
Four-State Non-malleable Codes with Explicit Constant Rate.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 1044, doi. 10.1007/s00145-019-09339-7
- By:
- Publication type:
- Article
Multilinear Maps from Obfuscation.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 1080, doi. 10.1007/s00145-019-09340-0
- By:
- Publication type:
- Article
Spin Me Right Round Rotational Symmetry for FPGA-Specific AES: Extended Version.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 1114, doi. 10.1007/s00145-019-09342-y
- By:
- Publication type:
- Article
Block Cipher Invariants as Eigenvectors of Correlation Matrices.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 1156, doi. 10.1007/s00145-020-09344-1
- By:
- Publication type:
- Article
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 1184, doi. 10.1007/s00145-020-09345-0
- By:
- Publication type:
- Article
Efficient and Scalable Universal Circuits.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 1216, doi. 10.1007/s00145-020-09346-z
- By:
- Publication type:
- Article
Tight Security of Cascaded LRW2.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 1272, doi. 10.1007/s00145-020-09347-y
- By:
- Publication type:
- Article
Statistical Concurrent Non-Malleable Zero-Knowledge from One-Way Functions.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 1318, doi. 10.1007/s00145-020-09348-x
- By:
- Publication type:
- Article
Oblivious Sampling with Applications to Two-Party k-Means Clustering.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 1362, doi. 10.1007/s00145-020-09349-w
- By:
- Publication type:
- Article