Found: 6
Select item for more details and to access through your institution.
An efficient identification protocol secure against concurrent-reset attacks.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 4, p. 339, doi. 10.1515/JMC.2009.021
- By:
- Publication type:
- Article
On hashing into elliptic curves.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 4, p. 353, doi. 10.1515/JMC.2009.022
- By:
- Publication type:
- Article
The Miller-Rabin test with randomized exponents.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 4, p. 307, doi. 10.1515/JMC.2009.019
- By:
- Publication type:
- Article
On a conjecture for balanced symmetric Boolean functions.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 4, p. 273, doi. 10.1515/JMC.2009.017
- By:
- Publication type:
- Article
Cryptanalysis of the MST<sub>3</sub> public key cryptosystem.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 4, p. 321, doi. 10.1515/JMC.2009.020
- By:
- Publication type:
- Article
A recursive construction for perfect hash families.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 4, p. 291, doi. 10.1515/JMC.2009.018
- By:
- Publication type:
- Article