Found: 10
Select item for more details and to access through your institution.
Unconditionally Secure Computation Against Low-Complexity Leakage.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 4, p. 1, doi. 10.1007/s00145-021-09402-2
- By:
- Publication type:
- Article
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 4, p. 1, doi. 10.1007/s00145-021-09384-1
- By:
- Publication type:
- Article
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 4, p. 1, doi. 10.1007/s00145-021-09413-z
- By:
- Publication type:
- Article
On Abelian and Homomorphic Secret Sharing Schemes.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 4, p. 1, doi. 10.1007/s00145-021-09410-2
- By:
- Publication type:
- Article
Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 4, p. 1, doi. 10.1007/s00145-021-09408-w
- By:
- Publication type:
- Article
The Design and Evolution of OCB.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 4, p. 1, doi. 10.1007/s00145-021-09399-8
- By:
- Publication type:
- Article
Fast Secure Two-Party ECDSA Signing.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 4, p. 1, doi. 10.1007/s00145-021-09409-9
- By:
- Publication type:
- Article
On the Exact Round Complexity of Secure Three-Party Computation.
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 4, p. 1, doi. 10.1007/s00145-021-09404-0
- By:
- Publication type:
- Article
Correction to: Editorial.
- Published in:
- 2021
- By:
- Publication type:
- Correction Notice
Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier?
- Published in:
- Journal of Cryptology, 2021, v. 34, n. 4, p. 1, doi. 10.1007/s00145-021-09405-z
- By:
- Publication type:
- Article