Found: 7
Select item for more details and to access through your institution.
The Inverse of χ and Its Applications to Rasta-Like Ciphers.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 4, p. 1, doi. 10.1007/s00145-022-09439-x
- By:
- Publication type:
- Article
Signed (Group) Diffie–Hellman Key Exchange with Tight Security.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 4, p. 1, doi. 10.1007/s00145-022-09438-y
- By:
- Publication type:
- Article
Efficient Perfectly Secure Computation with Optimal Resilience.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 4, p. 1, doi. 10.1007/s00145-022-09434-2
- By:
- Publication type:
- Article
Improved Differential-Linear Attacks with Applications to ARX Ciphers.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 4, p. 1, doi. 10.1007/s00145-022-09437-z
- By:
- Publication type:
- Article
Breaking the Decisional Diffie–Hellman Problem for Class Group Actions Using Genus Theory: Extended Version.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 4, p. 1, doi. 10.1007/s00145-022-09435-1
- By:
- Publication type:
- Article
ZK-PCPs from Leakage-Resilient Secret Sharing.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 4, p. 1, doi. 10.1007/s00145-022-09433-3
- By:
- Publication type:
- Article
On the (in)Security of ROS.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 4, p. 1, doi. 10.1007/s00145-022-09436-0
- By:
- Publication type:
- Article