Found: 20
Select item for more details and to access through your institution.
On Subversion-Resistant SNARKs.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09379-y
- By:
- Publication type:
- Article
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09385-0
- By:
- Publication type:
- Article
Introduction to the Special Issue on TLS 1.3.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09386-z
- By:
- Publication type:
- Article
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09403-1
- By:
- Publication type:
- Article
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09389-w
- By:
- Publication type:
- Article
On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09388-x
- By:
- Publication type:
- Article
Ascon v1.2: Lightweight Authenticated Encryption and Hashing.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09398-9
- By:
- Publication type:
- Article
Selfie: reflections on TLS 1.3 with PSK.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09387-y
- By:
- Publication type:
- Article
Fine-Grained Cryptography Revisited.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09390-3
- By:
- Publication type:
- Article
Round-Optimal Secure Multi-party Computation.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09382-3
- By:
- Publication type:
- Article
Modeling for Three-Subset Division Property without Unknown Subset.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09383-2
- By:
- Publication type:
- Article
The Deoxys AEAD Family.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09397-w
- By:
- Publication type:
- Article
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09391-2
- By:
- Publication type:
- Article
Simple and Generic Constructions of Succinct Functional Encryption.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09396-x
- By:
- Publication type:
- Article
Adaptively Secure Distributed PRFs from LWE.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09393-0
- By:
- Publication type:
- Article
Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09400-4
- By:
- Publication type:
- Article
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09394-z
- By:
- Publication type:
- Article
Translating the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves with (ℓ,ℓ,ℓ)-Isogenies.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09401-3
- By:
- Publication type:
- Article
Editorial.
- Published in:
- 2021
- By:
- Publication type:
- Editorial
Is There an Oblivious RAM Lower Bound for Online Reads?
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 3, p. 1, doi. 10.1007/s00145-021-09392-1
- By:
- Publication type:
- Article